Practice Test 2 Part 2 Flashcards
(48 cards)
Which strategy is MOST EFFECTIVE for maintaining network availability during scheduled maintenance?
A) Notifying users in advance about potential downtime
B) Implementing redundant systems to take over during maintenance
C) Scheduling maintenance during off-peak hours
D) Performing maintenance in small, incremental steps
Implementing redundant systems to take over during maintenance
Which scenario would require the SHORTEST RPO?
A) A financial institution processing high-frequency transactions
B) A research facility storing archived experimental data
C) A marketing agency working on weekly campaigns
D) A remote backup service provider with nightly backups
A) A financial institution processing high-frequency transactions
An IT team wants to predict how often their systems might fail during operation. Which metric are they focusing on?
A) MTTR
B) RTO
C) MTBF
D) RPO
C) MTBF
Which of the following is NOT a commonly cited advantage of using a hot site for disaster recovery?
A) Immediate availability with minimal downtime
B) Real-time replication of critical data
C) Lower operational costs compared to other recovery sites
D) Full mirroring of primary site infrastructure
C) Lower operational costs compared to other recovery sites
A company needs a high availability solution where one server handles all the traffic, and another server only becomes active if the primary server fails.
Which configuration are they most likely using?
A) Active-Active
B) Load Balancing
C) Active-Passive
D) Clustered Storage
C) Active-Passive
Question 53
Correct
A network administrator needs to allocate a range of IP addresses for devices on a specific subnet. They must ensure that the addresses are assigned dynamically within this range.
What configuration should the administrator focus on?
A) DHCP Exclusions
B) DHCP Reservations
C) DHCP Scope
D) DHCP Relay
C) DHCP Scope
A network administrator needs to ensure that certain IP addresses within the DHCP scope are not assigned to clients because they are reserved for static use.
What configuration should the administrator implement?
A) DHCP Exclusions
B) DHCP Reservations
C) DHCP Lease Time
D) DHCP Relay
A) DHCP Exclusions
Which of the following best describes the role of DNSSEC in a network?
A) It provides authentication and integrity for DNS responses to prevent spoofing attacks
B) It encrypts DNS queries and responses to protect data privacy
C) It ensures that DNS queries are routed through secure channels only
D) It blocks malicious IP addresses from accessing the DNS server
A) It provides authentication and integrity for DNS responses to prevent spoofing attacks
A company needs to securely connect its headquarters with a branch office located in another city, allowing both locations to share resources as if they were on the same local network.
What solution should they implement?
A) Site-to-Site VPN
B) Remote Access VPN
C) SSL VPN
D) Client-to-Site VPN
A) Site-to-Site VPN
A network administrator needs to configure a new router that has not yet been connected to the network.
What type of connection should they use to perform the initial setup?
A) Console
B) SSH
C) API
D) Telnet
A) Console
A company needs to encrypt sensitive data with a high level of security. They are considering using either a symmetric or an asymmetric encryption algorithm.
Which of the following algorithms should they use if they opt for a symmetric encryption method?
A) RSA
B) ECC
C) DSA
D) AES
D) AES
Which of the following best describes the role of MFA in IAM?
A) It allows users to access multiple systems with a single set of credentials
B) It enhances security by requiring users to provide two or more forms of verification before granting access
C) It provides users with temporary access to systems without requiring a password
D) It enables secure access to a network by encrypting all user credentials
B) It enhances security by requiring users to provide two or more forms of verification before granting access
Which of the following best describes the principle of least privilege in authorization?
A) It allows users to access all resources on a network to ensure maximum productivity
B) It ensures users are granted only the minimum permissions necessary to perform their job functions
C) It grants administrators unrestricted access to all network resources for easy management
D) It provides users with temporary elevated access to resources when needed
B) It ensures users are granted only the minimum permissions necessary to perform their job functions
A company recently installed biometric locks to secure its data center. However, they have noticed that some employees are experiencing frequent access denials even though they are authorized users.
What is the most likely cause of this issue?
A) The system has a high FRR
B) Spoofing attacks
C) DDoS attacks
D) The system has a high FAR
A) The system has a high FRR
A security team wants to monitor a broader range of attacker behaviors by setting up multiple decoy systems that work together to simulate a realistic network environment. This setup will allow them to gather extensive data on intruder techniques and methods. What type of security architecture are they implementing?
A) Honeypot
B) IDS
C) DMZ
D) Honeynet
D) Honeynet
Which of the following best defines a vulnerability in the context of network security?
A) A tool used to exploit weaknesses in a network
B) A weakness or flaw in a system that can be exploited by a threat
C) An unauthorized access attempt by a malicious actor
D) A security measure designed to protect against attacks
B) A weakness or flaw in a system that can be exploited by a threat
A company operating in the European Union collects personal data from its customers.
To comply with regulations that require giving customers control over their personal information, including the right to have their data erased, which regulation must the company adhere to?
A) PCI DSS
B) HIPAA
C) GDPR
D) SOX
C) GDPR
Which of the following is NOT an effective strategy for mitigating DoS attacks?
A) Implementing rate limiting to control traffic flow
B) Using firewalls to filter out malicious traffic
C) Deploying redundancy and load balancing to distribute traffic
D) Using anti-virus software to detect and prevent attacks
D) Using anti-virus software to detect and prevent attacks
A network administrator notices unauthorized devices appearing in different VLANs across the network. After investigating, they find that these devices are sending frames with 802.1Q tags that don’t match their assigned VLAN.
Which of the following actions would BEST prevent this type of attack in the future?
A) Enable BPDU guard on all switch ports
B) Disable DTP on all switch ports
C) Implement DHCP snooping on the network
D) Increase the length of the DHCP lease time
B) Disable DTP on all switch ports
Which of the following is the MOST effective technique for mitigating ARP-related attacks?
A) Implementing DHCP snooping on all network switches
B) Enabling port mirroring to monitor ARP requests
C) Using DAI to validate ARP packets
D) Deploying VLAN hopping to isolate ARP requests
C) Using DAI to validate ARP packets
A user reports that they were redirected to a suspicious website after entering the URL of their bank’s website. The security team investigates and finds that the user’s DNS request was intercepted and altered.
Which of the following measures would BEST prevent this type of attack in the future?
A) Deploying a VPN for all users
B) Configuring firewalls to block all inbound DNS traffic
C) Implementing DNSSEC to ensure the authenticity of DNS responses
D) Regularly flushing DNS caches on all user devices
C) Implementing DNSSEC to ensure the authenticity of DNS responses
A user reports that they received an unexpected email from their bank asking them to verify a transaction they never made. The security team discovers that the communication between the user and the bank was intercepted and altered.
What type of attack is MOST likely responsible for this incident?
A) A brute-force attack on the user’s email account
B) An on-path attack where the attacker intercepted the communication
C) A phishing attack where the user was tricked into providing credentials
D) A DDoS attack targeting the bank’s website
B) An on-path attack where the attacker intercepted the communication
Which of the following is a common consequence of a ransomware attack on an organization?
A) The organization’s data becomes inaccessible due to encryption by an attacker
B) The attacker gains unauthorized access to sensitive financial records
C) The organization’s public website is replaced with malicious content
D) The organization experiences a significant increase in spam emails
A) The organization’s data becomes inaccessible due to encryption by an attacker
A network administrator notices that two different devices on the network are using the same MAC address, causing connectivity issues and intermittent network loss for users.
What measure could have prevented this scenario?
A) Configuring port security to limit the number of devices allowed per port
B) Implementing network segmentation to isolate sensitive devices
C) Using strong encryption protocols to secure network traffic
D) Disabling unused ports and services on all network switches
A) Configuring port security to limit the number of devices allowed per port