Time limit: 0
Quiz Summary
0 of 22 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 22 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 22
1. Question
You have been tasked to access a remote computer for handling some administrative tasks over an unsecured network in a secure way.
Which of the following protocols will you use to access the remote computer to handle the administrative tasks?
CorrectIncorrect -
Question 2 of 22
2. Question
Your manager is trying to understand the difference between SFTP and FTPS. So, he asked you to explain the difference between them.
Which of the following statements are correct? (Choose all that apply.)
CorrectIncorrect -
Question 3 of 22
3. Question
One of the features of SNMPv3 is called message integrity.
CorrectIncorrect -
Question 4 of 22
4. Question
You have been hired as a security expert to implement a security solution to protect an organization from external threats. The solution should provide the organization with a superior ability to identify attacks, malware, and other threats and also provide packet filtering capabilities, VPN support, and network monitoring.
Which of the following security solutions will you implement to meet the requirement?
CorrectIncorrect -
Question 5 of 22
5. Question
Application whitelisting prevents undesirable programs from executing, while application blacklisting is more restrictive and allows only programs that have been explicitly permitted to run. (True/False)
CorrectIncorrect -
Question 6 of 22
6. Question
You have been tasked to implement a solution to encrypt data as it is written to the disk and decrypt data as it is read off the disk.
Which of the following solution will you implement to meet the requirement?
CorrectIncorrect -
Question 7 of 22
7. Question
In which of the following load balancer modes does two or more servers aggregate the network traffic load and work as a team to distribute the workload across all servers in order to prevent any single node from getting overloaded?
CorrectIncorrect -
Question 8 of 22
8. Question
You have been tasked to implement a solution to increase the security of your company’s local area network (LAN). All of the company’s external-facing servers (Web server, Mail server, FTP server) should be placed in a separate area in order to be accessible from the internet, but the rest of the internal LAN to be unreachable.
Which of the following techniques will you implement to meet the requirement?
CorrectIncorrect -
Question 9 of 22
9. Question
Which of the following VPN solutions is used to connect two local area networks utilized by businesses that want to provide their employees with secure access to network resources?
CorrectIncorrect -
Question 10 of 22
10. Question
The network administrator from your company notices that the network performance has been degraded due to a broadcast storm.
Which of the following techniques will you recommend to the network administrator in order to reduce broadcast storms? (Choose all that apply)
CorrectIncorrect -
Question 11 of 22
11. Question
As a security expert of your company you are responsible for preventing unauthorized (rogue) Dynamic Host Configuration Protocols servers from offering IP addresses to the clients (users).
Which of the following security technology will you implement to meet the requirement?
CorrectIncorrect -
Question 12 of 22
12. Question
The type of network hardware appliance which can help protect networks against combined security threats, including malware and attacks that simultaneously target separate parts of the network is known as?
CorrectIncorrect -
Question 13 of 22
13. Question
For security and monitoring purposes your company instructed you to implement a solution so that all packets entering or exiting a port should be copied and then should be sent to a local interface for monitoring.
Which of the following solution will you implement in order to meet the requirement?
CorrectIncorrect -
Question 14 of 22
14. Question
Which of the following options are cryptographic protocols? (Choose all the apply)
CorrectIncorrect -
Question 15 of 22
15. Question
Which of the following options are authentication protocols? (Choose all the apply)
CorrectIncorrect -
Question 16 of 22
16. Question
It has been noticed that the Wi-Fi of your company is slow with intermittent loss of connection. After investigation, you noticed that it was caused by channel interference.
Which of the following solutions will you implement to overcome issues such as channel interference when you build WLANs?
CorrectIncorrect -
Question 17 of 22
17. Question
You have been tasked to implement a solution to send product offers to consumers’ smartphones when they trigger a search in a particular geographic location, enter a mall, neighborhood, or store.
What solution will you implement in order to achieve that?
CorrectIncorrect -
Question 18 of 22
18. Question
Which of the following technologies will you use in order to send instant notifications to your subscribed users each time you publish a new blog post on your website?
CorrectIncorrect -
Question 19 of 22
19. Question
Which of the following features will you use to remotely clear your phones’ data in the event of losing your phone?
CorrectIncorrect -
Question 20 of 22
20. Question
Answer the fill-in-the-blank by typing one of the following type of attacks:
Inspection
Survey
Check
Scan
-
The main goal of performing a wireless site is to reveal areas of channel interference and dead zones, helping you avoid problems as you build the network and prevent obstacles for network users.
CorrectIncorrect -
-
Question 21 of 22
21. Question
A new social media app was launched recently that accepts all users worldwide by default. A cybersecurity analyst after reviewing the firewall logs detects that users from specific countries have conducted a cyber attack on the app. Which of the following access control methods should the analyst recommend to the developers?
CorrectIncorrect -
Question 22 of 22
22. Question
A penetration tester performing a pentest on the network of the Acme corporation. Once he tried to connect to the network the IPS/IDS system blocked his workstation, as it appeared a suspicious device. Which of the following features should the company use to allow the pentester to continue his work.
CorrectIncorrect