• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT PT 4 EXAM QUESTIONS

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT PT 4 EXAM QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -54 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation

Question 1: You have been tasked to access a remote computer for handling some

administrative tasks over an unsecured network in a secure way.Which of the following protocols will you use to access the remote computer to handle the administrative tasks?

SSH LDAPS SRTP HTTPS

Answer:

SSH Question 2: Which of the following options are cryptographic protocols? (Choose all the apply)

Answer:

SAE WPA2 CCMP WPA3

Question 3: Nate is the network administrator responsible for the database cluster at his company. His connections are load-balanced in the cluster with each new connection being sent to the next server in the cluster. What type of load-balancing is being implemented?

  • Round-robin
  • Affinity
  • Weighted
  • Rotating

Answer:

  • Round-robin

Question 4: One of the features of SNMPv3 is called message integrity.

TRUE FALSE

Answer:

TRUE Question 5: You are the security administrator for a large company where occasionally, a user needs to access certain resources that the user doesn't have permission to access. Which method would be the most beneficial?

  • Mandatory Access Control
  • Discretionary Access Control
  • Role-based Access Control
  • Rule-based Access Control

Answer:

  • Rule-based Access Control

Question 6: Caleb was tasked with setting up access control for a server. The requirements state that lower privileged users should not be able to see or access files or data that is meant for higher privileged users. What access control model is best suited to fit these requirements?

A. MAC

B. DAC

C. RBAC

D. SAML

Answer:

A. MAC

Question 7: Which of the following statements is true about symmetric algorithms?

  • They hide data within an image file.
  • They use one key to encrypt and another key to decrypt data
  • They use a single key to encrypt/decrypt
  • They use a single key to create a hashing value

Answer:

  • They use a single key to encrypt/decrypt
  • Question 8: The network administrator from your company notices that the network performance has been degraded due to a broadcast storm.Which of the following techniques will you recommend to the network administrator in order to reduce broadcast storms? (Choose all that apply) Split up your broadcast domain Check how often ARP tables are emptied Check for loops in switches Allow you to rate-limit broadcast packets Split up your collision domain

Answer:

Split up your broadcast domain Check how often ARP tables are emptied Check for loops in switches

Allow you to rate-limit broadcast packets Question 9: Which of the following options are authentication protocols? (Choose all the apply) WPA2 EAP WPA3 PEAP

RADIUS

Answer:

EAP PEAP

RADIUS

Question 10: You currently have web developers in your company who have direct access to production servers and can deploy code to it. These actions can lead to insecure code and code flaws being deployed to directly into the live environment. Currently, your company only has one server available (the production server). What is the best change that can be made to mitigate this risk?

  • Implement sandboxing
  • Implement virtualized servers
  • Implement a staging server
  • Implement deployment policies

Answer:

  • Implement a staging server
  • Question 11: Tanner has been given permission to run a vulnerability scan on the company's wireless network infrastructure. During the scan, he finds that ports 20 and 21 are open on most of the devices. What protocol is usually assigned to these ports?

A. FTP

B. SMTP

C. ICMP

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE AND STUDY GAMES ABOUT PT 4 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -54 Questions and Answers -format set of multi...

UNLOCK ACCESS $11.99