Network Foundations Flashcards

1
Q

Trust
Least common mechanism
Least privilege
Separation of privilege

A

Separation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

traceroute
netstat
ifconfig
nslookup

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Linux user wants to view detailed information about their network interfaces, including IP addresses, netmasks, and interface status.
Which command should they use?
-
traceroute
netstat
ping
ifconfig

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Linux user wants to view the routing table on their system to troubleshoot routing issues.
Which command should they use?

traceroute
ifconfig
ip
route

A

route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user is experiencing slow internet speeds and suspects network congestion.
Which command can they use to test the latency and response time to a specific destination?

netstat
tracert
ipconfig
ping

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user suspects that their Windows computer is infected with malware causing network issues.
Which command can they use to display active network connections and processes?

nslookup
ping
ipconfig
netstat

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user is experiencing network connectivity issues on their Windows computer.
Which command can they use to display the IP configuration of their computer?
-
nslookup
tracert
ipconfig
ping

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decentralized
Peer-to-peer
Client/server
Hierarchical

A

Hierarchical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In network security design, which principle suggests that security mechanisms should be easy to understand and use by users to encourage compliance?
Least privilege
-
Trust
Separation of privilege
Psych acceptability

A

Psych acceptability

Correct: That’s right! The psych acceptability principle suggests that security mechanisms should be easy to understand and use by users to encourage compliance and adherence to security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IDS and IPS
Firewalls
Encryption
Device hardware
A company’s network is under a distributed denial-of-service (DDoS) attack, causing significant disruption. Which solution can help mitigate this attack?

A

Device hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company is migrating its sensitive data to the cloud and wants to ensure that it is securely stored.
Which solution can help secure data in the cloud?
-
Using strong encryption algorithms
Sharing login credentials with trusted colleagues
Storing data without any security measures
Publishing sensitive data on public forums

A

Strong encryption algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An organization is deploying applications to the cloud and is concerned about unauthorized access.
Which approach can help secure cloud-based applications?
-
Disabling encryption for application data
Using weak passwords for user accounts
Granting unrestricted access to all users
Implementing multi-factor authentication (MFA)

A

multi-factor authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company is setting up a wireless network in its office building and wants to ensure that data transmission is secure.
Which wireless network infrastructure model should the company implement?
-
MAC filtering
WEP (Wired Equivalent Privacy)
Broadcasting SSID (service set identifier)
WPA2 (Wi-Fi Protected Access 2)

A

WPA2 (Wi-Fi Protected Access 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

❌A company’s wireless network suddenly experiences unusually slow internet speeds, and some users report unauthorized access to their accounts.
Which wireless attack type is likely occurring?
-
Bluesnarfing
Deauthentication attack
Wardriving
Evil twin attack

A

Evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

❌An employee connects to the company network remotely from a public Wi-Fi hotspot. Despite using a VPN, unauthorized access to company resources occurs.
Which aspect of zero-trust architecture could have prevented this unauthorized access?
-
Implicit trust in network connection
Trusting network location
Role-based access control
Zero trust network access (ZTNA)

A

Correct: That’s right! Zero trust network access (ZTNA) ensures that access to applications and resources is dynamically granted based on identity, device security posture, and other contextual factors, regardless of network location, which could have prevented unauthorized access in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

✅A company experiences a data breach due to a compromised employee device that was used to access sensitive information.
Which aspect of zero-trust architecture could have mitigated this breach?
-
Implicit trust in device security
Perimeter-based firewall
Static network segmentation
Least privilege access

A

Least privilege access✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Implementing security measures
Assigning security responsibility to IT department only
Ignoring regular security audits
Developing security policies and procedures
❌What is a key aspect of security governance?

A

Developing security policies and procedures✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

✅Which statement accurately reflects security governance?
1.) Security governance is solely concerned with implementing technical security measures.
2.) Security is the sole responsibility of the IT department.
3.) Security governance ensures compliance with regulations but does not focus on risk management.
4.) Security governance involves establishing policies, procedures, and controls to manage and protect organizational assets.

A

Security governance involves establishing policies, procedures, and controls to manage and protect organizational assets.✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Exclusively focusing on technical solutions
Ensuring complete elimination of security risks
Ignoring compliance requirements
Establishing accountability and responsibility for security

A

Establishing accountability and responsibility for security ✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

More Network Security Guidelines and Best Practices

A

Aggregate and correlated logs in a centralized location
Implement network address translation (NAT)
Use honeypots and honeynets
Ensure physical security of network devices and equip.
Implement data loss solution
Perform a third-party sec. assessment of the network
Implement an incident management process
Baseline everything(Desktop enviro, for serv, ect.)
Perform operating sys, and app hardening
Keep what is necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Addtional Network Security Guielines and Best Practices

A

Integrate sec. as part of the networ design
Use principle of least privilege
Avoid using insecure protocols
Implement a security policy
Use multi-fact auth.
Implement complex password policies
Perform user activity monitoring continuously
Implement network monitoring tools (wireshark)
Perform regular audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

“Information Security Plans”

P.
S.
A.
O.
C.

A

Purpose (Why)
Scope (Who is applies to)
Timeline (When the policy takes effect)
Authoriy (Who the signing authority is for the policy
Objectives (InfoSEC obj. that are the goal of the policy)
Compliance (the policy is designed to meet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Information Security Polic
Hint:
D.
T.
C.
E.
V.

A

Details (e.g., procedures, processes, controls)
Training
Contacts
Enforcement
Version History

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Information Security Planning
Hint:
I
F
H

A

Information tech is an ever-evolving space
From an info sec standpoint, new threats are—all the time
Having a security plan to prevent avoidable damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Information Security Plan

A

Protect ccompany data
Mitigate threats
Manage goals ($$$)
Instructions (DRP)
Responsibilities
Consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Elements of a Security Plan
P.
N.
A.
P.

A

Physical Security
Network Security
App. data security
Personal security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

6.CIA Triad
C.
I.
A.

A

Confidentiality (Protect Privacy)
Integrity (Ensure validity and accuracy of information)
Availability (allow info access (RAID) -Protect services thru load balances or clustering)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

❌A small e-commerce company wants to improve its security governance practices.
Which security governance solution would be most appropriate for them?
-
Conducting regular security awareness training for employees
Hiring a cybersecurity consultant
Installing antivirus software on all computers
Implementing a risk management framework

A

Implementing a risk management framework ✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

  • CVE-2017-0154
  • CVX-2018-TTL
  • CVE-541-2019
A
  • CVE-2017-0154 ✅
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Information Security Practices: Budgeting & Forecasting for InfoSec

Which type of classification involves looking at the content of a file to determine its classification label?

Context-based
User-based
Content-based
Type-based

A

Content-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Single Sign-on
Phone-factor
Two-factor
Multi-Sign-on

A

Two-factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following represent compromised access?
Instruction: Choose all options that best answer the question.
-
Unlocked doors
Adding new equipment
Damaged Ethernet cable
Overheating
Remote attacks

A

Adding new equipment✅
Remote attacks✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What Wireshark feature could you use on captured network traffic that allows you to view only ping related traffic?
Instruction: Choose the option that best answers the question.
-
Display filter
Data stream
Packet details pane
Capture filter

A

Display filter ✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Discovery and Footprinting tools can:
Instruction: Choose all options that best answer the question.
-
Gather resources about the machine
Identify live computers
Identify which ports are open
Reboot the infected computer
Cause the machine to power down
Discover what applications are running

A

Gather resources about the machine ✅
Identify live computers ✅
Identify which ports are open ✅
Discover what applications are running✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Who is responsible for security policies in an organization?
Instruction: Choose the option that best answers the question.
-
IT department team lead
W3C
Senior management
Microsoft

A

Senior management ✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the name of the tool that is a GUI version of the popular NMAP scanner?
Instruction: Choose the option that best answers the question.
-
Zenmap
Guimap
Ipscan
Superscan

A

Zenmap ✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What security service in the CIA triad is responsible for protecting from unauthorized access to data?
Instruction: Choose the option that best answers the question.
-
Confidentiality
Hashing
Availability
Integrity

A

Confidentiality ✅

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What vulnerability scanner has an open source, free to use version, plus also has a commercial version?
Instruction: Choose the option that best answers the question.
-
Nessus
Retina
Zenmap
Wireshark

A

Nessus ✅

39
Q

What tool would you use to view the packet headers and data payload of traffic traveling the network?
Instruction: Choose the option that best answers the question.
-
Superscan
Tracert
Wireshark
Zenmap

A

Wireshark ✅

40
Q

Which of these statements best describes the OSI model?
Instruction: Choose all options that best answer the question.
Four-layer model, with the network access layer at the bottom
Conceptual framework used to describe how network communications operate
Model used to define how the TCP/IP protocol stack works
Seven-layer model, with layer 1 at the bottom and layer 7 at the top

A

Conceptual framework used to describe how network communications operate ✅
Seven-layer model, with layer 1 at the bottom and layer 7 at the top ✅

41
Q

Vulnerabilities can arise from:
Instruction: Choose all options that best answer the question.
-
Design
Configuration
Device malfunction
Deployment
Remote attacks

A

Design✅
Configuration✅
Deployment✅

42
Q

While performing network discovery, what indicators can help determine services running on a system?
Instruction: Choose the option that best answers the question.
-
Existing user accounts
Missing patches
Open ports
Vulnerabilities that exists

A

Open ports ✅

43
Q

Echo reply
Unreachable destination
Echo request
Timeout exceeded
Internet Control Message Protocol (ICMP) type 11 is?

A

Timeout exceeded ✅

44
Q

Match each cryptography to the layer of the OSI model at which the cryptography is implemented.
“L2TP”
-
Data link
Application
Network
Transport

A

Network✅
Data link

45
Q

Match each cryptography to the layer of the OSI model at which the cryptography is implemented.
“S/MIME”
-
Data link
Application
Network

A

Transport✅

Application

46
Q

Match each cryptography to the layer of the OSI model at which the cryptography is implemented.
“TLS”
-
Data link
Application
Network
Transport

A

Data link ✅
Transport Layer Security (TLS) operates on multiple layers of the OSI model, including the session, presentation, and application layers:

47
Q

Match each cryptography to the layer of the OSI model at which the cryptography is implemented.
“IPSec”
-
Data link
Application
Network
Transport

A

Network ✅

48
Q

What is the biggest security concern with SNMP?
Instruction: Choose the option that best answers the question.
-
Turned on by default on many devices
Network management tools require specific expertise
Only available on open networks
Excessive processing overhead on the host machine
Community strings must be alphanumeric

A

Turned on by default on many devices ✅

49
Q

Match each type of information to the layer of the OSI model at which it can be filtered or firewalled.
“UDP port number”
-
Presentation
Network
Data link
Transport

A

Transport ✅

50
Q

Match each type of information to the layer of the OSI model at which it can be filtered or firewalled.
“IP address”
-
Presentation
Network
Data link
Transport

A

Network ✅

51
Q

Match each type of information to the layer of the OSI model at which it can be filtered or firewalled.
“MAC address”
-
Presentation
Network
Data link
Transport

A

Data link ✅

52
Q

Match each type of information to the layer of the OSI model at which it can be filtered or firewalled.
“File extension”
-
Presentation
Network
Data link
Transport

A

Presentation ✅

53
Q

What regional Internet registry is used to manage the IP addresses for North America?
Instruction: Choose the option that best answers the question.
-
RIPE NCC
AFRINIC
ARIN
APNIC

A

ARIN ✅

54
Q

What technique can you use to ensure that only approved software is allowed to run on computers on the network?
Instruction: Choose the option that best answers the question.
-
Encryption
Whitelisting
DLP
Firewall

A

Whitelisting ✅

55
Q

What ICMP message type does the ping command send to the target IP address?
Instruction: Choose the option that best answers the question.
-
Type 8
Type 4
Type 3
Type 0

A

Type 8 ✅

56
Q

What are some tools to discover open ports?
Instruction: Choose all options that best answer the question.
-
Superscan
OpenPort
Nmap
Zenmap
DiscoverIT

A

Superscan ✅
Nmap ✅
Zenmap ✅

57
Q

Data Link Layer
Session Layer
Network Layer
Application Layer

A

Application Layer ✅

58
Q

Application Layer
Network Access Layer
Transport Layer
Internet Layer

A

Internet Layer ✅

59
Q

Application Layer
Network Layer
Session Layer
Transport Layer

A

Transport Layer ✅

60
Q

Session Layer
Data Link Layer
Application Layer
Transport Layer

A

Session Layer ✅

61
Q

Match the OC or STS level to its transmission rate.
Answer Choices
A:STS-48
B:STS-1
C:STS-3
D:OC-1
E:OC-3
F:OC-24
-
“51.840 Mbps”

A

A
B. STS-1 ✅
C
D.OC-1✅
E
F

62
Q

Match the OC or STS level to its transmission rate.
Answer Choices
A:STS-48
B:STS-1
C:STS-3
D:OC-1
E:OC-3
F:OC-24
-
“155.520 Mbps”

A

A.
B.
C. STS-3 ✅
D.
E. OC-3 ✅
F.

63
Q

Match the OC or STS level to its transmission rate.
Answer Choices
A:STS-48
B:STS-1
C:STS-3
D:OC-1
E:OC-3
F:OC-24
-
“2488.320 Mbps”

A

A. STS-48 ✅
B.
C.
D.
E.
F.

64
Q

Match the OC or STS level to its transmission rate.
Answer Choices
A:STS-48
B:STS-1
C:STS-3
D:OC-1
E:OC-3
F:OC-24
-
“1244.160 Mbps”

A

A.
B.
C.
D.
E.
F. OC-24 ✅

65
Q

What are the characteristics of Ethernet?
It is used for WAN type technologies
It uses packets and frames for transmission
It allows devices to communicate on a local network
It is a network layer protocol

A

It uses packets and frames for transmission✅
It allows devices to communicate on a local network✅

66
Q

Which layer of the OSI Model is responsible for data delivery and packet routing?
Instruction: Choose the option that best answers the question.
Physical
Network
Transport
Data Link

A

Network✅

67
Q

What are the characteristics of broadcast domains?
Instruction: Choose all options that best answer the question.
-
They are a group of systems that can receive one another’s broadcast messages
Their boundaries must be defined by VLANs
Their members can be computers connected to the same switch
Their boundaries must be defined by routers

A

They are a group of systems that can receive one another’s broadcast messages✅
Their members can be computers connected to the same switch✅
Their boundaries must be defined by routers✅

68
Q

Which of the following advantage of OTN determines the errors across different provider networks?
Instruction: Choose the option that best answers the question.
Tandem connection monitoring
Forward error correction
Transparent transport of client signals
Switching scalability

A

Tandem connection monitoring ✅

69
Q

What are the responsibilities of Layer 3 in the OSI model?
Instruction: Choose all options that best answer the question.
Error correction
Logical addressing
Physical addressing
Routing

A

Logical addressing ✅
Physical addressing ✅

70
Q

Which Ethernet variant has a maximum length of 100 meters, uses two pairs of data grade twisted-pair wire, and uses a RJ-45 connector on the UTP cable?
Instruction: Choose the option that best answers the question.
-
100BASE-TX
1000BASE-T
FCoE
10GbE

A

100BASE-TX ✅

71
Q

What are the characteristics of the collision domain in the layer 2 network?
Instruction: Choose all options that best answer the question.
It is a group of systems that can have their data collide with one another
Within a collision domain, many devices can send at the same time
All ports on the hub forms the single collision domain
All ports on a switch share one collision domain

A

It is a group of systems that can have their data collide with one another. ✅
All ports on the hub form a single collision domain. ✅

72
Q

Match the switch operation mode to its description.
Instruction: For each option, select the best answer choice.
Answer Choices
A:Cut-through
B:Store-and-forward
C:Fragment-free
-
“Receives the entire frame before performing the error checking”

A

A
B. Store-and-forward ✅
C

73
Q

Match the switch operation mode to its description.
Instruction: For each option, select the best answer choice.
Answer Choices
A:Cut-through
B:Store-and-forward
C:Fragment-free
-
“Starts sending as soon as the destination MAC address of the frame is received”

A

A. Cut-through ✅
B.
C.

74
Q

Match the switch operation mode to its description.
Instruction: For each option, select the best answer choice.
Answer Choices
A:Cut-through
B:Store-and-forward
C:Fragment-free
-
“Waits to receive the error prone bytes of a frame, checks error, and then starts forwarding”

A

A
B
C. Fragment-free ✅

75
Q

What are the functions of routers?
Instruction: Choose all options that best answer the question.
Routers allow you to connect to a configuration interface through its serial port
Routers determine the shortest possible path to send the data packets to the destination and will essentially use that shortest path
Routers maintain routing table in memory that contains information about other networks that exist and how to reach those networks
Routers use the physical address that is stored in the header of a frame to determine where the traffic will be forwarded

A

Routers determine the shortest possible path to send the data packets to the destination and will essentially use that shortest path ✅
Routers maintain routing table in memory that contains information about other networks that exist and how to reach those networks ✅

76
Q

Which statements are true about how the 4G and 5G protocol stacks compare?
Instruction: Choose all options that best answer the question.
The 5G protocol stack for the user plane has an additional layer at the top of the stack as compared to the 4G user plane protocol stack
The 4G and 5G protocol stacks for the control plane are exactly the same in name and operation
The 5G protocol stack for the control plane has an additional layer at the top of the stack as compared to the 4G control plane protocol stack
The control plane stacks of both 4G and 5G use the same names

A

The 5G protocol stack for the user plane has an additional layer at the top of the stack as compared to the 4G user plane protocol stack✅
The control plane stacks of both 4G and 5G use the same names✅

77
Q

Which statement is correct about the application layer of the 5G protocol stack?
Instruction: Choose the option that best answers the question.
Traditionally, the application layer is oblivious to the underlying network infrastructure, whether 5G or otherwise
The IP and TCP protocols are contained within the functionality of the application layer when applied to the 5G protocol stack
The application layer sits on top of the SDAP layer in the user plane 5G protocol stack
The application layer only exists in the control plane 5G protocol stack and not in the user plane

A

Traditionally, the application layer is oblivious to the underlying network infrastructure, whether 5G or otherwise ✅

78
Q

What features of 5G networks is the physical layer responsible for?
Instruction: Choose all options that best answer the question.
Sequence numbering
Error correction
Numerology
Quality of service
MIMO
Beamforming

A

Numerology✅
MIMO✅
Beamforming✅

79
Q

Which layer of the OSI model sees an increase in complexity when the model is applied to wireless communications as compared to wired connectivity?
Instruction: Choose the option that best answers the question.
Network
Internet
Application
Transport
Data link

A

Data link ✅

80
Q

Which statements are true about the way in which the 5G protocol stack relates to the OSI model?
Instruction: Choose all options that best answer the question.
The 5G protocol stack primarily fits in to the network and transport layers of the OSI model
Only the application layers are the same on both the OSI and 5G protocol stacks
The physical layer of the 5G protocol stack maps on a one-to-one basis with the physical layer of the OSI model
One layer from the 5G protocol stack maps to the data link layer, but includes a header and a trailer with many more fields for control information
Four sublayers of the 5G protocol stack map to the data link layer of the OSI model

A

The physical layer of the 5G protocol stack maps on a one-to-one basis with the physical layer of the OSI model ✅
Four sublayers of the 5G protocol stack map to the data link layer of the OSI model ✅

81
Q

Using Ethernet as an example of a wired technology on the OSI model, what are the primary components required at the data link layer within the header of the Ethernet frame for wired communication to take place?
Instruction: Choose the option that best answers the question.
The source MAC address
Control information that aids in synchronizing communicating hosts
Destination IP address
The source and destination MAC addresses

A

The source and destination MAC addresses ✅

82
Q

The four sublayers of the 5G protocol stack for the user plane leverage various types of channels, bearers, and flows which carry and manage data in various ways. Place these entities in the correct order as they are passed from the physical layer all the way up to the SDAP layer.
Result: Correct. Great job!

A

Physical channels
Transport channels
Logical channels
RLC channels
Radio bearers
QoS flows

83
Q

How does the OSI model map to the PDU layer of the 5G user plane stack?
Instruction: Choose the option that best answers the question.
The network, transport, session, and presentation layers map to the PDU layer of the 5G user plane protocol stack
None of the OSI model layers map to the PDU of the 5G user plane protocol stack
Only the network layer of the OSI model maps to the PDU layer of the 5G user plane stack
The data link layer of the OSI model maps to the PDU and application layers of the 5G user plane stack
The network and transport layers of the OSI model map to the PDU layer of the 5G user plane stack

A

The network, transport, session, and presentation layers map to the PDU layer of the 5G user plane protocol stack ✅

84
Q

When mapping the OSI model to the TCP/IP model, what is true about the way in which layers are mapped?
Instruction: Choose all options that best answer the question.
The application, internet, and network layers of the OSI model are mapped on a one-to-one basis with the corresponding application, transport, and internet layers of the TCP/IP model respectively
The session and presentation layers of the OSI model are incorporated into the application layer of the TCP/IP model
The transport and network layers of the TCP/IP model are incorporated into the data link layer of the OSI model
The data link and the physical layer of the OSI model are incorporated into the link layer of the TCP/IP model

A

The session and presentation layers of the OSI model are incorporated into the application layer of the TCP/IP model ✅
The data link and the physical layer of the OSI model are incorporated into the link layer of the TCP/IP model ✅

85
Q

Which layer of the OSI model is responsible for providing error-free data transmission over a network, handling error detection, and error correction?
Presentation Layer
Network Layer
Application Layer
Transport Layer

A

Transport Layer ✅

86
Q

In the TCP/IP model, which layer corresponds to both the session, presentation, and application layers of the OSI model?
Network Interface Layer
Transport Layer
Internet Layer
Application Layer

A

Application Layer ✅

87
Q

✅A company regularly updates its software and patches vulnerabilities in its systems.
Which fundamental network security principle is being followed?
Authentication
Encryption
Least privilege
Patch management

A

Patch management ✅

88
Q

Recon and Probing
DNS and ICMP tools within the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite
Standard and customized
SNMP tools Port scanners and port mappers
Security probes

A

🤖 portscanning “Nmap Security Scanner”
🤖GPU used to hack
🤖Thru File and Printer Sharing
🤖Removing Log Files
🤖Defense in depth

89
Q

✅An individual uses pre-written scripts and tools to exploit known vulnerabilities without understanding the underlying mechanisms.
Which type of attacker is involved?
-
Red team
White hat hacker
Black hat hacker
Script kiddie

A

Script kiddie ✅

90
Q

✅A group of security professionals simulates attacks on a company’s network to identify vulnerabilities and improve defenses.
Which type of team is involved?
White team
Red team
Purple team
Blue team

A

Red team✅ (WTF❗❌)

91
Q

Cybersecurity Threats

A

a.Threat Actor (Clear path - Cannot be trace- Unauthorized modifiications -
b.Threat Target
c.Target
Risk assessment - $$$ what is value

92
Q

✅An attacker intercepts sensitive information, such as log-in credentials or financial data, that is transmitted between a user and a legitimate website.
Which type of threat is this?
Social engineering attack
Insider threat
Man-in-the-middle attack
Data breach

A

Man-in-the-middle attack✅

93
Q

AAA

A

The AAA framework of Network and Security
authentication
authorization
accounting

94
Q
A