4. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: Phishing
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: DNS poisoning
PASS
6. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: Spoofing
PASS
7. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: Evil twin
PASS
8. Question
Actioned
Item completed: 02/16/2022 03:34 AM
Value: 1
Answer: dig
PASS
3. Question
Actioned
Item completed: 02/16/2022 03:37 AM
Value: 1
Answer: Baseline review
PASS
4. Question
Actioned
Item completed: 02/16/2022 03:37 AM
Value: 1
Answer: Upgrade the firmware on the wireless router
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:37 AM
Value: 1
Answer: Password policy
PASS
6. Question
Actioned
Item completed: 02/16/2022 03:37 AM
Value: 1
Answer:
Require at least one of different kinds of characters (numbers, capital letters)
Require a minimum number of characters
Require at least one of different kinds of characters (numbers, capital letters)
Require a minimum number of characters
PASS
7. Question
Actioned
Item completed: 02/16/2022 03:38 AM
Value: 1
Answer: To gain access to a password protected system
PASS
2. Question
Actioned
Item completed: 02/16/2022 03:40 AM
Value: 1
Answer: mbsacli /target 192.168.0.5 > reports.txt
PASS
3. Question
Actioned
Item completed: 02/16/2022 03:40 AM
Value: 1
Answer: 3 of 4
PASS
4. Question
Actioned
Item completed: 02/16/2022 03:40 AM
Value: 1
Answer: 2 of 4
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:40 AM
Value: 1
Answer: Scans a range of IP Addresses
PASS
4. Question
Actioned
Item completed: 02/16/2022 03:43 AM
Value: 1
Answer: The host-based firewall settings are blocking the service.
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:43 AM
Value: 1
Answer: UTM appliance
PASS
1. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer:
The default MTU is 1500 bytes
The MTU is the largest size an encapsulated segment can have
The default MTU is 1500 bytes
The MTU is the largest size an encapsulated segment can have
PASS
2. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer: Configure VLANs on the switch
PASS
3. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer: Checks the MAC table for the destination system
PASS
4. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer: The first is true, the second is false
PASS
5. Question
Actioned
Item completed: 02/16/2022 03:49 AM
Value: 1
Answer: VLAN hopping
PASS
1. Question
Actioned
Item completed: 02/16/2022 03:50 AM
Value: 1
Answer:
Subnet mask
IPv4 address
Subnet mask
IPv4 address
PASS
2. Question
Actioned
Item completed: 02/16/2022 03:50 AM
Value: 1
Answer: ARP poisoning
PASS
3. Question
Actioned
Item completed: 02/16/2022 03:51 AM
Value: 1
Answer:
Preventing the malformed DHCP traffic
Preventing the rogue DHCP servers
Preventing the malformed DHCP traffic
Preventing the rogue DHCP servers
PASS
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
CORRECT
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
CORRECT
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
CORRECT
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
CORRECT
Which type of DoS attack orchestrates an attack using uninfected computers?
CORRECT
Which of the following is considered a secure protocol?
CORRECT
Which of these attacks is a form of Wi-Fi DoS attack?
CORRECT
A spoofed DNS record spreads to other DNS servers. What is this attack called?
CORRECT
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
CORRECT
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
CORRECT
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
CORRECT
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
CORRECT
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
CORRECT
At what layer of the OSI model do proxy servers operate?
CORRECT
What feature of Windows Server allows for agentless authentication?
CORRECT
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
CORRECT
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
CORRECT
Which of the following features is common to both an NGFW and traditional firewalls?
CORRECT
What kind of firewall blocks traffic based on application data contained within the packets?
CORRECT
What software might be installed on a device to authenticate it to the network?
CORRECT
Comments
Post a Comment