Q: 11
Lyle is the IT director for a medium-sized food service supply company in Nebrask
a. Lyle's company employs over 300 workers, half of which use computers. He recently came back
from a security training seminar on
logical security. He now wants to ensure his company is as secure as possible. Lyle has many network
nodes and workstation nodes across the network. He does not have much time for implementing a
network-wide
solution. He is primarily concerned about preventing any external attacks on the network by using a
solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be
easy to implement
and be network-wide. What type of solution would be best for Lyle?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
You are monitoring your network traffic with the Wireshark utility and noticed that your network is
experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the
network. What will be your
first reaction as a first responder?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
The network administrator wants to strengthen physical security in the organization. Specifically, to
implement a solution stopping people from entering certain restricted zones without proper
credentials. Which of
following physical security measures should the administrator use?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Which of the following network monitoring techniques requires extra monitoring software or
hardware?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Which type of risk treatment process Includes not allowing the use of laptops in an organization to
ensure its security?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Assume that you are working as a network defender at the head office of a bank. One day a bank
employee informed you that she is unable to log in to her system. At the same time, you get a call
from another network administrator informing you that there is a problem connecting to the main
server. How will you prioritize these two incidents?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Identify the password cracking attempt involving precomputed hash values stored as plaintext and
using these to crack the password.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Dan and Alex are business partners working together. Their Business-Partner Policy states that they
should encrypt their emails before sending to each other. How will they ensure the authenticity of
their emails?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
John wants to implement a firewall service that works at the session layer of the OSI model. The
firewall must also have the ability to hide the private network information. Which type of firewall
service is John thinking of
implementing?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
An US-based organization decided to implement a RAID storage technology for their data backup
plan. John wants to setup a RAID level that require a minimum of six drives but will meet high fault
tolerance and with a
high speed for the data read and write operations. What RAID level is John considering to meet this
requirement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2