Simulator 1 of 0
Network Security – Part C
Time limit: 0
Simulator Summary
0 of 40 Questions completed
Questions:
Information
You have already completed the simulator before. Hence you can not start it again.
Simulator is loading…
You must sign in or sign up to start the simulator.
You must first complete the following:
Results
Simulator complete. Results are being recorded.
Results
0 of 40 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- comptia n+ 0%
- comptia-n008 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 40
1. Question
A small business owner is concerned about the security of their online accounts and wants to add an extra layer of protection for their employees. They have heard about various authentication methods and want to choose one that is both secure and easy to use. Which of the following options would best fit their needs?
CorrectIncorrect -
Question 2 of 40
2. Question
A large retail organization has many branches with its own local area networks (LANs). The IT department wants to centralize the authentication of users who access the company’s resources. Which of the following solutions would be the most appropriate?
CorrectIncorrect -
Question 3 of 40
3. Question
An IT manager has received reports that some unauthorized computers have been accessing the company’s confidential information through the Wi-Fi network. The IT manager has been able to identify the MAC addresses of the computers in question:
- Computer X: 00:00:5e:00:53:af
- Computer Y: aa:55:5e:00:53:af
- Computer Z: 44:20:5e:00:53:af
Which of the following tools would the IT manager use to prevent these computers from connecting to the Wi-Fi network and accessing confidential information?
CorrectIncorrect -
Question 4 of 40
4. Question
Drag and drop the common networking attacks into their respective fields.
Sort elements
- Social engineering
- Rogue access point
- Evil twin
-
Uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
-
Any unauthorized WLAN radio that is connected to a corporate network.
-
A fake Wi-Fi network that looks like a legitimate access point to steal victimsβ sensitive details.
CorrectIncorrect -
Question 5 of 40
5. Question
One purpose of a brute-force attack is to:
CorrectIncorrect -
Question 6 of 40
6. Question
A company has recently suffered a breach in its IT systems. To prevent this from happening again, the CEO has asked the IT team to implement security measures that will provide insight into potential security risks. What is the first step the IT team should take in order to accomplish this goal?
CorrectIncorrect -
Question 7 of 40
7. Question
Which of the following networking attacks redirects online traffic to a fraudulent website that resembles its intended destination?
CorrectIncorrect -
Question 8 of 40
8. Question
An attacker calls an employee of a company posing as an IT support technician and requests the employee’s password for a specific application. The attacker uses this password to access sensitive company information. Which of the following security threats BEST describes this scenario?
CorrectIncorrect -
Question 9 of 40
9. Question
During a routine network security audit, the network administrator discovers unusual network activity originating from a device in the LAN. Upon further investigation, it is revealed that the device is sending ARP packets with false source IP addresses, leading to redirection of network traffic. Which of the following security incidents is being described?
CorrectIncorrect -
Question 10 of 40
10. Question
Which of the following passwords would you select to strengthen the security of your account against unauthorized access? (Select TWO)
CorrectIncorrect -
Question 11 of 40
11. Question
An organization is concerned about the security of its network and wants to identify any potential vulnerabilities that could be exploited by attackers. The security team recommends a simulation of a real-world attack on their network to identify any weaknesses. Which of the following options is the MOST appropriate solution for the organization?
CorrectIncorrect -
Question 12 of 40
12. Question
Which of the following statements are true regarding Security Information and Event Management (SIEM)? (Select TWO)
CorrectIncorrect -
Question 13 of 40
13. Question
A network administrator is tasked with ensuring the security of the organization’s systems. Which of the following practices will BEST help to minimize the risk of security breaches?
CorrectIncorrect -
Question 14 of 40
14. Question
Which of the following security concepts is a dictionary that provides definitions for publicly disclosed cybersecurity vulnerabilities and exposures?
CorrectIncorrect -
Question 15 of 40
15. Question
You have been asked to educate a graduate intern on the concept of zero-day vulnerabilities. Which of the following definitions most accurately describes a zero-day vulnerability?
CorrectIncorrect -
Question 16 of 40
16. Question
A network technician is tasked with implementing a solution to increase the local area network security within an organization. All of the companyβs external-facing servers (Web server, FTP server) should be placed in a separate area in order to be accessible from the internet, and the rest servers (Mail server, Storage server) of the internal LAN to be unreachable. Which of the following techniques does the technician need to implement to meet the requirement?
CorrectIncorrect -
Question 17 of 40
17. Question
A network security engineer is tasked with implementing a solution to allow users from untrusted networks to access the Web Server and the Mail Server while keeping the private network secured and inaccessible. Which of the following does the engineer need to implement to complete the task?
CorrectIncorrect -
Question 18 of 40
18. Question
Which of the following are commonly recognized authentication protocols? (Select TWO)
CorrectIncorrect -
Question 19 of 40
19. Question
An organization is dealing with a sudden surge in network traffic. The network administrator notices that all the traffic is coming from a single IP address and is being generated by multiple infected devices in the network. Which of the following security threats is the organization MOST likely dealing with?
CorrectIncorrect -
Question 20 of 40
20. Question
Which type of attack involves the interception of communications between an API endpoint and a client, potentially allowing the attacker to access or modify sensitive data being transmitted between them?
CorrectIncorrect -
Question 21 of 40
21. Question
Your website uses Cloudflare to resolve DNS queries. Upon checking the records, you have discovered there are A and MX record entries that point to unknown and potentially harmful IP addresses. Which of the following attacks have you just discovered?
CorrectIncorrect -
Question 22 of 40
22. Question
A company’s network is experiencing slow response times and unexpected redirects when attempting to access certain websites. The IT administrator suspects a security issue and begins to investigate. Which of the following security threats is MOST likely causing the issue?
CorrectIncorrect -
Question 23 of 40
23. Question
A security expert is tasked with implementing a solution to prevent Rogue DHCP servers from offering IP addresses to end-users within an organization. Which of the following security technology does the expert need to implement to meet the requirement?
CorrectIncorrect -
Question 24 of 40
24. Question
In which of the following wireless network attacks does the attacker set up a fraudulent Wi-Fi access point that appears to be legitimate but is used to eavesdrop on wireless communications?
CorrectIncorrect -
Question 25 of 40
25. Question
An employee of a company received an email that contained a malicious link. After clicking on the link, the employee’s files were encrypted and a ransom payment was demanded. What type of security threat did the company fall victim to?
CorrectIncorrect -
Question 26 of 40
26. Question
An attacker breaks into a password-protected computer by systematically entering every word in a dictionary as a password. What type of attack does the attacker carry out?
CorrectIncorrect -
Question 27 of 40
27. Question
In a corporate office, a visitor walks into the building behind an employee who was authorized to access the building. The visitor then gains access to restricted areas of the building without having to present any identification or pass through security. What type of security threat is this scenario describing?
CorrectIncorrect -
Question 28 of 40
28. Question
An attacker is observing over the shoulder of a user to steal sensitive information, such as a password or personal identification number (PIN). Which of the following security threats BEST describes the attacker’s method?
CorrectIncorrect -
Question 29 of 40
29. Question
An IT administrator has been assigned to enhance the security of a medium-sized organization’s wired network. The goal is to limit unauthorized access to the network and prevent malicious actors from compromising sensitive data. One aspect of this is to only allow authorized devices to connect to the network. The administrator decides to implement a feature that allows only packets with a matching MAC address to be considered secure and forwarded while restricting all other packets. Which of the following options best describes the feature the administrator should implement to meet these requirements?
CorrectIncorrect -
Question 30 of 40
30. Question
An enterprise is looking for a security solution that restricts access to sensitive data from specific geographic locations. Which of the following solutions is the BEST fit for this requirement?
CorrectIncorrect -
Question 31 of 40
31. Question
A small business wants to securely connect its two remote offices together. Which of the following VPN solutions would be the MOST appropriate to meet their needs?
CorrectIncorrect -
Question 32 of 40
32. Question
A network administrator is tasked with accessing a remote computer to handle some administrative tasks over an unsecured network in a secure way. Which of the following protocols does the administrator need to use to connect to the device?
CorrectIncorrect -
Question 33 of 40
33. Question
An attacker has managed to intercept the communication between a router and a workstation by utilizing a tool named Driftnet. The attacker’s machine acts as a bridge between the router and the workstation, allowing the attacker to secretly access all communication. What type of security attack is this scenario an example of?
CorrectIncorrect -
Question 34 of 40
34. Question
Which of the following protocols is used in the AAA framework to provide centralized authentication for users who want to gain access to the network?
CorrectIncorrect -
Question 35 of 40
35. Question
A company wants to prevent unauthorized individuals from accessing its network by requiring all users to provide specific information and credentials before logging in. Which of the following security measures would BEST meet this requirement?
CorrectIncorrect -
Question 36 of 40
36. Question
End-users in an office building have reported issues with connectivity to a web server. During the troubleshooting process, a network administrator notes a high CPU utilization on the server when executing the command
grep processor /proc/cpuinfo
. What is the MOST likely cause of the problem?CorrectIncorrect -
Question 37 of 40
37. Question
An organization is experiencing a security breach where the attacker is able to intercept and alter data that is being transmitted on the network. Which type of attack is this?
CorrectIncorrect -
Question 38 of 40
38. Question
Drag and drop the social engineering attacks into their respective fields.
Sort elements
- Phishing
- Tailgating
- Shoulder surfing
-
An attack that uses masquerade email as a means of taking advantage of users
-
A type of attack in which someone without the proper authentication follows an authenticated employee into a restricted area
-
A type of data theft where cybercriminals steal personal information or confidential information by peering over the targetβs shoulders
CorrectIncorrect -
Question 39 of 40
39. Question
Which of the following is the MOST effective way to prevent network security breaches from happening in the workplace?
CorrectIncorrect -
Question 40 of 40
40. Question
Which of the following types of attacks is shown in the figure below?
CorrectIncorrect