D315 Flashcards

(60 cards)

1
Q

A network is being created for an office, and there is a need for a router that manages internal network connections with no contact with the internet.

Which type of router is needed?

A

Core router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An IT manager is designing a new network and needs a device that connects multiple networks.

Which device is needed?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network in a small office building connects all devices using wired connections with a star topology.

Which type of network is described?

A

LAN (Local Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An executive uses Bluetooth to connect a laptop, a mobile phone, and a headset.

Which type of network is described?

A

PAN (Personal Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A city uses fiber optic cable to connect smaller networks throughout the whole city.

Which type of network is described?

A

MAN (Metropolitan Area Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to view a list of network addresses and port numbers.

Which command in Linux should be used for this purpose?

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to determine which ports have an active connection.

Which command in Windows should be used for this purpose?

A

netstat -an

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In the process of setting up a Linux-based network system, a technician needs to view network interfaces and their settings.

Which command should be used?

A

ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A person is troubleshooting a network issue and needs to test DNS connectivity.

Which Linux command should be used?

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the TCP/IP layer that includes the Transmission Control Protocol (TCP)?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which layer of the TCP/IP model includes the Internet Message Access Protocol (IMAP)?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which OSI model layer creates, maintains, and disconnects process communications over the network?

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which OSI model layer is responsible for breaking data into packets?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which layer of the OSI reference model includes all computer programs that interact with the network?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the OSI model layer that includes the IPX?

A

Network Layer, Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the layer of the OSI model that is responsible for logical addressing?

A

Network Layer, Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the layer of the OSI model that translates binary computer language into the language of the transmission medium?

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A company uses cloud service to manage its IT resources. The underlying hardware resources are shared by other companies as well.

What is the cloud deployment model described in the scenario?

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An organization uses one cloud service provider for data management and another service provider for development platforms.

What is the cloud deployment model described in the scenario?

A

Multi-Cloud Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A company needs to maximize the number of virtual machines that can run on each host.

Which hypervisor should be used?

A

Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A developer has an existing computer with an operating system. The developer wants to use a hypervisor to have access to several virtual machines for a specific project.

Which form of hypervisor fits the need described in the scenario?

A

Type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An attacker gains unauthorized access to a computer and modifies browser security settings.

What is the purpose of the attack?

A

Data modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An attacker uses a trojan horse to forward usernames and passwords to an anonymous email address.

What is the purpose of the attack?

A

Data export

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A hacker purposefully breaks IT security to gain unauthorized access to systems and publish sensitive data.

Which term describes the given hacker?

A

Black-hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A hacker acts as an information system security professional who is hired to perform penetration testing. Which term best describes the given hacker?
White-hat
26
An organization is the victim of an attack in which an attacker uses a software program to try all possible combinations of a password and user ID. What is the type of cyberattack described in this scenario?
Brute-force attack
27
A data breach exposed usernames and passwords to customer accounts of an online retailer. An attacker uses the exposed data to attempt to access accounts of another online retailer. Which malicious attack strategy is represented in the scenario?
Credential stuffing
28
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account. Which type of cyberattack is described?
Dictionary attack
29
An organization is the victim of an attack in which an attacker tries to gain access to a system by disguising their computer as another computer. What is the type of cyberattack described in this scenario?
IP address spoofing
30
An attacker intercepts messages between two parties before transferring them on to the correct destination. Which type of cyberattack is described?
Man-in-the-middle attack
31
An organization is the victim of an attack in which an attacker uses a program to take control of a connection by pretending to be each end of the connection. What is the type of cyberattack described in this scenario?
Session hijacking
32
An attacker uses a false identification to gain physical access to IT infrastructure. Which malicious attack strategy is represented in the scenario?
Social engineering
33
An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking the users into providing login credentials. Which type of cyberattack is described?
Phishing
34
An organization is the victim of an attack in which an attacker uses a DNS poisoning strategy to direct users from a legitimate website to the attacker's website. What is the type of cyberattack described in this scenario?
Pharming
35
A company is implementing network security components to ensure a higher level of data trustworthiness. What is the CIA triad component targeted in the scenario?
Integrity
36
Which CIA triad component is a driver for enabling data encryption?
Confidentiality
37
Which component of the IT security CIA triad is a driver for implementing audit and monitoring controls?
Confidentiality
38
What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?
Integrity
39
What is an example of a violation of the CIA triad component confidentiality?
40
What is an example of a violation of the CIA triad component availability?
41
A company uses hash value comparisons to determine if the data in a database has changed. What is the CIA triad component targeted in the scenario?
Integrity
42
A company is updating the devices it provides to employees to ensure that each employee has consistent network access. What is the CIA triad component targeted in the scenario?
Availability
43
A development team is designing a web application. The team is considering possible errors and exceptions. The team is committed to protecting sensitive information above all else in the event of an error or exception. What is the security principle implemented in this scenario?
Fail-safe
44
An organization is designing an information system dashboard that can be customized for various departments. The goal is to make the dashboard intuitive, user-friendly, and secure. Which design principle for security is being incorporated?
Human-centeredness
45
After discovering that employees have been circumventing session timeouts for a company's internal network, the company is holding meetings to inform employees of the motivation behind the timeouts and risks involved in the workaround. Which security principle is demonstrated in this scenario?
Psychological acceptability
46
An organization needs to define a data classification standard and designate the assets that are critical to the organization's mission. Which type of policy should be used?
Asset classification study
47
A company needs to specify security operations and management of all IT assets within the seven domains of the IT infrastructure. Which type of policy should be used?
Asset management policy
48
An organization has experienced war chalking in the past and wants to take actions to mitigate this type of attack. What should this organization do?
Use Wi-fi Protected Access 2
49
A company is specifically worried about DoS/DDoS attacks. Which strategy should be used as a mitigation against this type of attack?
Monitor normal traffic patterns
50
An organization uses an access control in which employees working in similar categories are grouped together and given the same permissions. What is the form of access control involved in this scenario?
Role-based Access Control
51
An organization's network has been the target of several cyberattacks. Which strategy should the organization use for Wi-Fi hardening?
Configure the Wi-Fi signal strength to reduce range
52
A company set up a firewall to analyze network traffic, considering each packet and how groups of packets are used. What is the form of access control involved in this scenario?
Context-based Access Control
53
A company is developing a data protection methodology in order to improve data protection measures. What is a strategy that should be used?
Implement authentication methodologies
54
After a series of attacks, an organization needs to bolster its data protection measures. Which strategy should be used to increase data protection?
Use transport level encryption
55
When assigned to a new project, a user is given temporary permissions as an editor. Which network security concept does this scenario address?
Authorization
56
A financial company requires a manager to verify any changes made to a client's electronic profile made by an employee. What is the principle used to address accounting in this situation?
Segregation of duties
57
In order to reduce the risk of insider attacks, a company assigned role-based permissions to its users. Which network security concept does this scenario address?
Authorization
58
An organization is updating its information security policies in order to comply with the Personal Information Protection and Electronic Documents Act (PIPEDA). What should this organization expect to be required to do under this legislation?
Disclose how personal identifiable information is used.
59
An organization is updating its information security policies in order to comply with the Personal Information Protection and Electronic Documents Act (PIPEDA). What should this organization expect to be required to do under this legislation?
Implement appropriate security safeguards for stored personal data
60
A company is creating an information security policy document with many sub-policies. Which information should be included for each sub-policy to ensure the policy is clear and comprehensive?
Compliance requirements the sub-policy is designated to meet