PDF Download
FREE AND STUDY GAMES ABOUT PT 4 EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -54 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: You have been tasked to access a remote computer for handling some
administrative tasks over an unsecured network in a secure way.Which of the following protocols will you use to access the remote computer to handle the administrative tasks?
SSH LDAPS SRTP HTTPS
Answer:
SSH Question 2: Which of the following options are cryptographic protocols? (Choose all the apply)
Answer:
SAE WPA2 CCMP WPA3
Question 3: Nate is the network administrator responsible for the database cluster at his company. His connections are load-balanced in the cluster with each new connection being sent to the next server in the cluster. What type of load-balancing is being implemented?
- Round-robin
- Affinity
- Weighted
- Rotating
Answer:
- Round-robin
Question 4: One of the features of SNMPv3 is called message integrity.
TRUE FALSE
Answer:
TRUE Question 5: You are the security administrator for a large company where occasionally, a user needs to access certain resources that the user doesn't have permission to access. Which method would be the most beneficial?
- Mandatory Access Control
- Discretionary Access Control
- Role-based Access Control
- Rule-based Access Control
Answer:
- Rule-based Access Control
Question 6: Caleb was tasked with setting up access control for a server. The requirements state that lower privileged users should not be able to see or access files or data that is meant for higher privileged users. What access control model is best suited to fit these requirements?
A. MAC
B. DAC
C. RBAC
D. SAML
Answer:
A. MAC
Question 7: Which of the following statements is true about symmetric algorithms?
- They hide data within an image file.
- They use one key to encrypt and another key to decrypt data
- They use a single key to encrypt/decrypt
- They use a single key to create a hashing value
Answer:
- They use a single key to encrypt/decrypt
Question 8: The network administrator from your company notices that the network performance has been degraded due to a broadcast storm.Which of the following techniques will you recommend to the network administrator in order to reduce broadcast storms? (Choose all that apply) Split up your broadcast domain Check how often ARP tables are emptied Check for loops in switches Allow you to rate-limit broadcast packets Split up your collision domain
Answer:
Split up your broadcast domain Check how often ARP tables are emptied Check for loops in switches
Allow you to rate-limit broadcast packets Question 9: Which of the following options are authentication protocols? (Choose all the apply) WPA2 EAP WPA3 PEAP
RADIUS
Answer:
EAP PEAP
RADIUS
Question 10: You currently have web developers in your company who have direct access to production servers and can deploy code to it. These actions can lead to insecure code and code flaws being deployed to directly into the live environment. Currently, your company only has one server available (the production server). What is the best change that can be made to mitigate this risk?
- Implement sandboxing
- Implement virtualized servers
- Implement a staging server
- Implement deployment policies
Answer:
- Implement a staging server
Question 11: Tanner has been given permission to run a vulnerability scan on the company's wireless network infrastructure. During the scan, he finds that ports 20 and 21 are open on most of the devices. What protocol is usually assigned to these ports?