Quiz Summary
0 of 40 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 40 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 40
1. Question
Which of the following secure protocols will you use to remotely access a computer and perform administrative tasks over an insecure network?
CorrectIncorrect -
Question 2 of 40
2. Question
As a network engineer, could you provide clarification on the differences between SFTP and FTPS for your manager, highlighting which of the following statements are accurate? (Select TWO.)
CorrectIncorrect -
Question 3 of 40
3. Question
Your organization has recently experienced a security breach and you have been tasked with improving the security of your network management protocol. You have been asked to choose a protocol that provides authentication and encryption for transmitted data. Which of the following options will you choose to meet the requirement?
CorrectIncorrect -
Question 4 of 40
4. Question
As a security expert, you have been tasked with implementing a comprehensive security solution to protect an organization from external threats. This solution should have the ability to effectively detect attacks, malware, and other security risks and provide packet filtering, VPN support, and network monitoring capabilities. Which of the following security solutions would best meet these requirements?
CorrectIncorrect -
Question 5 of 40
5. Question
Your organization has been facing security issues with the usage of unsecured applications by employees on their work devices. To prevent this, which of the following solutions will you implement to block access to unsecured applications on company devices?
CorrectIncorrect -
Question 6 of 40
6. Question
Which of the following encryption solutions will you implement to ensure secure storage and retrieval of data, with encryption applied at the time of writing to the disk and decryption performed when reading from the disk?
CorrectIncorrect -
Question 7 of 40
7. Question
In which of the following load-balancing configurations do multiple servers work collaboratively to distribute network traffic and ensure that no single node experiences excessive workload?
CorrectIncorrect -
Question 8 of 40
8. Question
Which of the following solutions would you implement to enhance the security of your company’s local area network (LAN) while ensuring that external-facing servers such as the web server, mail server, and FTP server remain accessible from the internet, while the rest of the internal LAN remains protected?
CorrectIncorrect -
Question 9 of 40
9. Question
Which of the following virtual private network (VPN) solutions is most commonly used to securely connect two local area networks employed by businesses to provide their employees with access to network resources?
CorrectIncorrect -
Question 10 of 40
10. Question
As a security professional, what techniques would you recommend to the network administrator to minimize the impact of broadcast storms and enhance network performance? (Select all that apply)
CorrectIncorrect -
Question 11 of 40
11. Question
As a security expert in your company, you are responsible for preventing unauthorized Dynamic Host Configuration Protocol (DHCP) servers from providing IP addresses to clients. Which of the following security technologies would you implement to meet this requirement?
CorrectIncorrect -
Question 12 of 40
12. Question
Which type of network hardware appliance provides comprehensive protection against multiple security threats, including malware and coordinated attacks targeting various parts of the network?
CorrectIncorrect -
Question 13 of 40
13. Question
Which of the following technologies will you utilize to ensure that all packets entering or exiting a specific port are duplicated and transmitted to a local interface for monitoring purposes?
CorrectIncorrect -
Question 14 of 40
14. Question
Which of the following options are cryptographic protocols? (Select TWO.)
CorrectIncorrect -
Question 15 of 40
15. Question
Which of the following options are commonly used authentication protocols in secure systems? (Select all that apply)
CorrectIncorrect -
Question 16 of 40
16. Question
As a network administrator, you have identified that the company’s Wi-Fi network is experiencing slow performance and intermittent connection loss. Upon investigation, it was determined that the issue is caused by channel interference. To resolve these challenges in the deployment of wireless local area networks (WLANs), which of the following solutions would you recommend implementing?”
CorrectIncorrect -
Question 17 of 40
17. Question
What technology will you utilize to deliver targeted product offers to consumers’ smartphones based on their location, such as when conducting a search in a specific geographic area or entering a shopping center, neighborhood, or retail store?
CorrectIncorrect -
Question 18 of 40
18. Question
What technology will you implement to provide real-time notifications to subscribed users upon publication of new content on your website?
CorrectIncorrect -
Question 19 of 40
19. Question
Which of the following options provides the capability to remotely clear data from your phone in the event of its loss?
CorrectIncorrect -
Question 20 of 40
20. Question
You are a penetration tester planning a project for a client. You need to select a framework for the project. Which of the following frameworks provides guidance for a comprehensive penetration testing process and is designed to be flexible and customizable to meet the needs of the tester and client?
CorrectIncorrect -
Question 21 of 40
21. Question
Your organization is planning to deploy a new wireless network and wants to ensure that it operates optimally. You have been tasked with conducting a site survey to identify potential issues before the deployment. Which of the following activities should you perform to meet the requirement?
CorrectIncorrect -
Question 22 of 40
22. Question
Which of the following Public key infrastructure (PKI) terms is known as an organization that acts to validate the identities of entities (such as websites, email addresses, companies, or individual persons) and bind them to cryptographic keys through the issuance of electronic documents known as digital certificates?
CorrectIncorrect -
Question 23 of 40
23. Question
As an IT professional responsible for ensuring the security of the domain yourcompany.com, which includes the sub-domains www.yourcompany.com, mail.yourcompany.com, intranet.yourcompany.com, secure.yourcompany.com, and me.yourcompany.com, which type of certificate would you recommend to secure all first-level sub-domains under a single domain name?
CorrectIncorrect -
Question 24 of 40
24. Question
An organization has implemented an information security system to protect its critical data. They have assigned different levels of access to the system based on the user’s role and responsibilities within the organization. Which access control model is being implemented in this scenario?
CorrectIncorrect -
Question 25 of 40
25. Question
A software company is developing a new application for its clients and is looking for a security solution to manage user access to the application. Which of the following access control methods is most appropriate for this scenario?
CorrectIncorrect -
Question 26 of 40
26. Question
Which type of certificate is commonly utilized to ensure the integrity of a software application through digital signature, enabling end-users to verify that the code they have received has not been tampered with or compromised by a third party?
CorrectIncorrect -
Question 27 of 40
27. Question
You are a network administrator responsible for securing a small organization’s internal web application. The organization’s budget does not allow for the purchase of a publicly trusted certificate. Which type of certificate should you use to secure the web application?
CorrectIncorrect -
Question 28 of 40
28. Question
Which of the following authentication methods enables a user to access multiple websites using a single set of credentials, eliminating the need for creating separate login credentials for each site?
CorrectIncorrect -
Question 29 of 40
29. Question
Your company wants to integrate its cloud-based applications with the existing Active Directory for centralized authentication and authorization. Which of the following solutions can be used to achieve this integration?
CorrectIncorrect -
Question 30 of 40
30. Question
What is the term used to describe the capability in cloud computing to adjust the allocation of resources in response to changing user demands?
CorrectIncorrect -
Question 31 of 40
31. Question
Which of the following security technologies would you implement in order to configure the Wi-Fi of your company’s LAN, allowing designated workstations access to the internet while restricting access for the rest?
CorrectIncorrect -
Question 32 of 40
32. Question
In order to ensure comprehensive security monitoring and analysis of all network activities within your organization, you have been tasked with implementing a solution that centralizes the recording of events. Which of the following security measures would you implement to fulfill this requirement?
CorrectIncorrect -
Question 33 of 40
33. Question
In a small office, you have been tasked with setting up a secure wireless network for the employees to use. You want a solution that is easy to use and does not require much technical knowledge. Which of the following options would you choose to meet this requirement?
CorrectIncorrect -
Question 34 of 40
34. Question
What is the method used to conserve IP addresses by allowing private IP addresses to access the internet?
CorrectIncorrect -
Question 35 of 40
35. Question
Which of the following techniques is used by a firewall to control inbound and outbound network traffic based on predefined security rules?
CorrectIncorrect -
Question 36 of 40
36. Question
Which of the following Virtual Private Network (VPN) technologies is utilized to establish a secure connection between a personal device and a remote server on a private network?
CorrectIncorrect -
Question 37 of 40
37. Question
An organization has implemented an information security system to protect its sensitive data. The system is configured such that only authorized users can access the resources they need to perform their job responsibilities. Which access control model is being implemented in this scenario?
CorrectIncorrect -
Question 38 of 40
38. Question
A network administrator is tasked with upgrading the company’s network management system to improve security. The current system is using SNMPv2, which lacks proper authentication and encryption. Which version of SNMP should the administrator implement to ensure secure communication and management of network devices?
CorrectIncorrect -
Question 39 of 40
39. Question
An organization wants to implement a secure protocol for accessing and maintaining its directory service, ensuring that the communication between the client and the server is encrypted. Which of the following protocols should be implemented to achieve this goal?
CorrectIncorrect -
Question 40 of 40
40. Question
A company is looking for a solution to secure its email communication, ensuring the confidentiality, integrity, and authenticity of the messages exchanged between employees. Which of the following protocols should they implement to meet these requirements?
CorrectIncorrect