Time limit: 0
Quiz Summary
0 of 20 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Test complete. Results are being recorded.
Results
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Question 1 of 20
1. Question
A remote office wants to connect with the head office located in another city. The office budget doesn’t allow expensive WAN solutions to be implemented for a VPN connection. Which VPN model can use the public medium (Internet) to connect the remote office to the corporate backbone network without spending a fortune?
CorrectIncorrect -
Question 2 of 20
2. Question
Your manager wants to implement a split tunneling VPN to access the company resources on the corporate servers. Which of the following is considered a security issue with split tunneling?
CorrectIncorrect -
Question 3 of 20
3. Question
Which type of console access allows an administrator to manage switches and routers by connecting a laptop and running a terminal program to access the device’s interface?
CorrectIncorrect -
Question 4 of 20
4. Question
Where in the network are jump servers placed to facilitate device management once a management session has been set up and configured?
CorrectIncorrect -
Question 5 of 20
5. Question
Which of the following statements about in-band management and out-of-band management are true? (Choose two.)
CorrectIncorrect -
Question 6 of 20
6. Question
The Identity and Access Management (IAM) framework allows a service provider to define user authentication using a username and password. What other methods are available for user authentication? (Choose two)
CorrectIncorrect -
Question 7 of 20
7. Question
You are configuring a RADIUS client to communicate with the RADIUS server. Which ports should be configured to use authentication and accounting provisions?
CorrectIncorrect -
Question 8 of 20
8. Question
How can an administrator configure SSO authentication to ensure the service provider can authenticate the claims being passed as originating from the identity provider (Idp)?
CorrectIncorrect -
Question 9 of 20
9. Question
Your company wants strict access permissions for each employee based on their job requirements. Which control method is most suitable for this purpose?
CorrectIncorrect -
Question 10 of 20
10. Question
Which of the following methods is a mitigation technique to slow down a hacker and study the attack vector?
CorrectIncorrect -
Question 11 of 20
11. Question
Which part of the CIA triad ensures data accessibility by using redundant systems and components to create highly available information systems?
CorrectIncorrect -
Question 12 of 20
12. Question
Which of the following is not an appropriate example of the Internet of Things (IoT)? (Choose two.)
CorrectIncorrect -
Question 13 of 20
13. Question
A hacker is attacking the central corporate servers of a reputed organization. She sends a request to a third-party server and forges the packet’s source address with the victim’s IP address. When a client accesses the packet, the third party responds with the victim’s IP address. Which type of DoS attack is being carried out in this scenario?
CorrectIncorrect -
Question 14 of 20
14. Question
An attacker is trying to circumvent the vLAN tags during a vLAN hopping attack by placing a fake VLAN tag and the real tag into the packet. What happens when a frame goes through multiple switches during the attack?
CorrectIncorrect -
Question 15 of 20
15. Question
An employee in your company was terminated from the job two weeks ago. When you arrived at the office on Monday, you found that the data from all the hosts in a web server farm had been deleted. No authorized entries were found in the data center records. However, you suspect that the disgruntled employee might be behind it. Which of the following attacks was performed at the web server farm?
CorrectIncorrect -
Question 16 of 20
16. Question
Which network functions can be interfered with by a DNS poisoning attack?
CorrectIncorrect -
Question 17 of 20
17. Question
Some of your organization’s employees are receiving fishy emails. A seemingly genuine email from the project manager asks for the web server’s login details. Others were targeted at administrators and were aimed at learning habits. What kind of attack are the employees experiencing?
CorrectIncorrect -
Question 18 of 20
18. Question
You are responsible for the security of an organization’s server farm. You are considering server hardening procedures to ensure optimum security against major threat actors. Which of the following can be considered viable server-hardening techniques?
CorrectIncorrect -
Question 19 of 20
19. Question
Network Access Control (NAC) agents check the reported health and integrity of the client before allowing it on the network. Which other parameters are checked by the NAC agents? (Choose two.)
CorrectIncorrect -
Question 20 of 20
20. Question
Which of the following is why a low-bit modulus key pair expires sooner than a high-bit key pair?
CorrectIncorrect
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Current
- Correct
- Incorrect