Network Support and Security Course Final Exam Answers Full 100% 2023

This is Network Support and Security Course Final Exam Answers Full 100% in 2023 for Module 3: Network Support in the course Network Support and Security releases on SkillsForAll. All questions that have been answered are the best choice for practice to get 100%. The latest update is in 2023.

  1. What information can a technician obtain by running the tracert command on a Windows PC?

    • the available bandwidth between the PC and a destination.
    • the available routes in the PC routing table to reach a destination.
    • layer 3 hops a packet crosses as it travels to a destination.
    • the verification of Layer 2 connectivity between the PC and a destination.
      Explanation & Hints:

      The tracert command in Windows can help a technician locate Layer 3 problems by returning a list of hops a packet takes as it is routed through a network. This helps verify Layer 3 connectivity and identify the point along the path where a problem can be found if there is no end-to-end connectivity.

  2. Which Windows utility would a technician use to discover which user was logged in to the system when a critical problem occurred?

    • Users and Groups MMC
    • Event Viewer
    • Device Manager
    • Task Manager
      Explanation & Hints:

      When a critical issue arises, technicians can investigate the system using the Windows Event Viewer. Windows Event Viewer logs contain information about events affecting the system, including when a user logs into the system.

  3. Refer to the exhibit. A technician is attempting to map the local network using CDP. According to the output shown, which two statements are true about router Branch01?

    Network Support and Security Course Final Exam Answers 01
    Network Support and Security Course Final Exam Answers 01
    • Router Branch01 is directly connected to another router named DataCenter.
    • Router Branch01 is directly connected to port Fa0/1 on device BR1.
    • Router Branch01 is directly connected to port Gi0/1/0 on device BR2.
    • Router Branch01 is directly connected to three Cisco switches.
    • Router Branch01 port Gi0/0/0 is directly connected to a Layer 2 switch.
      Explanation & Hints:

      The output of the show CDP neighbors command on Branch01 indicates that DataCenter is connected to the Gi0/0/0 port on router Branch01 and that the Fa0/1 port on switch BR1 is connected to the Gi0/1/1 port on router Branch01. Two Cisco switches are attached to router Branch01, as indicated by the two S capability codes in the Capability column. The Local Interface column displays the port on Branch01 connected to the device, and the PortID column indicates the port on the connected device.

  4. What security benefit is provided by SSH?

    • protection from malicious data reaching servers and clients.
    • protection from DoS attacks against routers and Layer 3 switches.
    • protection from viruses and malware for endpoints.
    • protection from threat actors deciphering remote access session data.
      Explanation & Hints:

      Internet Protocol Security (IPsec) protects sensitive data and secures VPNs. IPsec tunneling encrypts all data sent between tunnel endpoints. IPsec also can be used to authenticate data originating from an authorized sender.

  5. Which output of a ping command can determine two important pieces of information? (Choose two.)

    • the round-trip time for the request to reach the destination and the response to return
    • the IP address of the gateway router that connects the source device to the internet
    • the number of domains that the packet travels through from the source to the destination
    • which network device is causing delays in delivering the packet to the destination IP address
    • whether or not the destination IP address is reachable through the network
      Explanation & Hints:

      A successful ping command confirms that the destination IP address is reachable through the network. The ping command output also displays the average round-trip time for the ping request to reach the destination and the ping response to return.

  6. A network administrator needs to segment the local area network to isolate traffic from different departments so that network permissions unique to each department can be implemented. Which network topology provides a solution to achieve the objective?

    • WLAN
    • PAN
    • VLAN
    • MAN
      Explanation & Hints:

      Implementing VLANs on a local area network allows an administrator to segment and isolate traffic for administrative purposes. Ports on a switch can be grouped in VLANs, and traffic in each VLANs is kept separate from other VLANs by the switch. This allows the administrator to apply different network permissions to the isolated traffic on the VLANs.

  7. What are the two characteristics of a site-to-site VPN? (Choose two.)

    • The VPN is established between the client PC and a VPN gateway.
    • Traffic between clients and the VPN gateway is automatically encrypted.
    • A VPN gateway device is needed at both ends of the tunnel.
    • The client initiates the VPN connection.
    • Clients have no awareness of the VPN.
      Explanation & Hints:

      A site-to-site VPN is created between two VPN gateways to establish a secure tunnel. The VPN traffic is only encrypted between the two gateway devices and not between the client and the gateway. The client host will have no knowledge that a VPN is being used.

  8. Which troubleshooting method involves swapping a device suspected of having issues with a known good device to see if the problem is solved?

    • educated guess
    • divide-and-conquer
    • comparison
    • substitution
      Explanation & Hints:

      With the substitution troubleshooting method, a know suitable device is used to replace a suspected bad device. If this fixes the problem, then the problem was with the removed device. If the issue remains, the cause resides someplace else, and the troubleshooting continues.

  9. Which type of cloud service is a user accessing when using Google Sheets to create a financial report?

    • PaaS
    • SaaS
    • IaaS
    • FaaS
      Explanation & Hints:

      Google Sheets is an example of SaaS, or software as a service. The software that powers Google Sheet functionality is located on cloud servers managed by Google. PaaS is a platform and service used primarily by software developers to develop and test new applications. IaaS is an infrastructure service in which servers and other network devices, such as firewalls, are deployed in the cloud. FaaS functions as a service that provides dynamically allocated servers when a request is made for specific application services, such as providing a web service when a web page is requested.

  10. A technician receives a trouble ticket from a user reporting that a website is no longer accessible. What two questions would the technician ask to narrow down the potential problem? (Choose two.)

    • Could you access this web site previously from this device?
    • What operating system is installed on your computer?
    • Do you remember your password to this web site?
    • What model computer are you using to access this site?
    • Can you access other web sites from this computer browser?
      Explanation & Hints:

      To narrow down the problem, the technician asks if the computer was previously able to access the website and if other websites are accessible. If the answer is yes to both questions, the technician has narrowed the issue to problems with the single website on this day.

  11. The IT department of a high school is developing cybersecurity policies. One policy item regulates the blocking of obtaining movies and sounds through peer-to-peer networks on school computers. Which two user threats does this policy address? (Choose two.)

    • unauthorized downloads and media
    • data theft
    • poorly enforced security policies
    • no awareness of security
    • unauthorized websites
      Explanation & Hints:

      Network and device infections and attacks can be traced back to users who have downloaded unauthorized emails, photos, music, games, apps, or videos to their computers, networks, or storage devices. Most movies and music recordings downloaded from peer-to-peer networks are distributed illegally.

  12. A penetration test carried out by an organization identified a backdoor on the network. What action should the organization take to find out if their systems have been compromised?

    • Look for usernames that do not have passwords.
    • Look for unauthorized accounts.
    • Scan the systems for viruses.
    • Look for policy changes in Event Viewer.
      Explanation & Hints:

      If a penetration test is successful, the corporation should check to locate vulnerabilities in the network and also check to see if there are new unauthorized accounts.

  13. Which attack takes control over a user’s mobile device and instructs the device to exfiltrate user-sensitive information and send it to threat actors?

    • Grayware
    • MitMo
    • Bluejacking
    • SMiShing
      Explanation & Hints:

      Man-in-the-Mobile (MitMo) is a variation of a man-in-the-middle attack. It is used to take control over the mobile device of a user. When infected, the mobile device is instructed to exfiltrate user-sensitive information and send it to the attackers.

  14. What do you call an impersonation attack that takes advantage of a trusted relationship between two systems?

    • man-in-the-middle
    • spamming
    • spoofing
    • sniffing
      Explanation & Hints:

      In spoofing attacks, hackers can disguise their devices by using a valid address from the network and therefore bypass authentication processes. MAC addresses and IP addresses can be spoofed and can also be used to spoof ARP relationships.

  15. What non-technical method could a cybercriminal use to gather sensitive information from an organization?

    • ransomware
    • man-in-the-middle
    • social engineering
    • pharming
      Explanation & Hints:

      Social engineering is a very effective way to get personal or sensitive corpoate information from an employee. Cybercriminals may try to get to know an employee and then use trust or familiarity to gather the needed information.

  16. What type of attack occurs when data goes beyond the memory areas allocated to an application?

    • SQL injection
    • RAM injection
    • Buffer overflow
    • RAM spoofing
      Explanation & Hints:

      A buffer overflow occurs when data is written beyond the limits of a buffer. By changing data beyond the boundaries of a buffer, the application can access memory allocated to other processes. This can lead to a system crash or data compromise, or provide escalation of privileges.

  17. Which type of cyber threat would cause electrical power outages?

    • hardware failure
    • sabotage
    • human error
    • utility interruption
      Explanation & Hints:

      Utility interruption is a cyber threat that can cause Electrical power outages and water damage resulting from sprinkler failure.

  18. Which cybersecurity solution should an organization implement to support employees who travel and use public Wi-Fi networks to access corporate information?

    • firewall
    • intrusion detection application
    • remote access VPN
    • site-to-site VPN
      Explanation & Hints:

      There are several measures that organizations and users need to implement to defend against wireless and mobile device attacks, including:

      • Take advantage of basic wireless security features such as authentication and encryption by changing the default configuration settings.
      • Restrict access point placement by placing these devices outside the firewall or within a demilitarized zone — a perimeter network that protects an organization’s LAN from untrusted devices.
      • Use WLAN tools such as NetStumbler to detect rogue access points or unauthorized workstations.
      • Develop a policy for secure guest access to an organization’s Wi-Fi network.
        Employees in an organization should use a remote access VPN for WLAN access when on public Wi-Fi networks.
  19. Employees in an organization report that they cannot access the customer database on the main server. Further investigation reveals that the database file is now encrypted. Shortly afterward, the organization receives a threatening email demanding payment for the decryption of the database file.

    What type of attack has the organization experienced?

    • ransomware
    • DoS attack
    • trojan horse
    • man-in-the-middle attack
      Explanation & Hints:

      In a ransomware attack, the attacker compromises the victum computer and encrypts the hard drive so that data can no longer be accessed by the user. The attacker then demands payment from the user to decrypt the drive.

  20. All employees in an organization receive an email stating that their account password will expire immediately and that they should reset their password within five minutes.

    Which of the following statements best describes this email?

    • It is a piggyback attack.
    • It is a DDoS attack.
    • It is a hoax.
    • It is an impersonation attack.
      Explanation & Hints:

      A hoax is an act intended to deceive or trick someone. This type of email can cause unnecessary disruption, extra work, and fear.

  21. Match the host-based security solution to the description.

    • Host intrusion detection system ==> It is installed on a device or server to monitor suspicious activity. It can also monitor configuration information about the device held in the system registry.
    • Next-generation firewall ==> It is a network security device that combines a traditional firewall with other network-device-filtering functions.
    • Data loss prevention ==> The tools provide a centralized way to ensure that sensitive data is not lost, misused or accessed by unauthorized users.
    • Host-based firewall ==> It runs on a device to restrict incoming and outcoming network activity for that device. It can allow or deny traffic between the device and the network.
    • Host intrusion prevention system ==> It monitors a device for known attacks and anomalies (deviations in bandwidth, protocols, and ports) or finds red flags by assessing the protocols in packets.
    • Endpoint detection and response ==> It is an integrated security solution that continuously monitors and collects data from an endpoint device. It then analyzes the data and responds to any threats it detects.
      Explanation & Hints:

      Place the options in the following order:

      Host-based firewall It runs on a device to restrict incoming and outcoming network activity for that device. It can allow or deny traffic between the device and the network.
      Host intrusion detection system It is installed on a device or server to monitor suspicious activity. It can also monitor configuration information about the device held in the system registry.
      Host intrusion prevention system It monitors a device for known attacks and anomalies (deviations in bandwidth, protocols, and ports) or finds red flags by assessing the protocols in packets.
      Endpoint detection and response It is an integrated security solution that continuously monitors and collects data from an endpoint device. It then analyzes the data and responds to any threats it detects.
      Data loss prevention The tools provide a centralized way to ensure that sensitive data is not lost, misused or accessed by unauthorized users.
      Next-generation firewall It is a network security device that combines a traditional firewall with other network-device-filtering functions.
  22. Refer to the exhibit. The image shows a firewall filtering network traffic based on information at highlighted OSI model Layers. Which type of firewall is represented?

    Network Support and Security Course Final Exam Answers 02
    Network Support and Security Course Final Exam Answers 02
    • Application Gateway
    • Next Generation
    • Packet filtering (stateless)
    • Stateful
      Explanation & Hints:

      Packet filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and 4 information. Stateless firewalls use a simple policy table look-up that filters traffic based on specific criteria.

  23. To which component of the CIA triad security information principle does tokenization apply?

    • authorization
    • availability
    • integrity
    • confidentiality
      Explanation & Hints:

      To accomplish confidentiality without encryption, tokenization is a substitution technique that can isolate data elements from exposure to other data systems.

  24. Which statement describes the principle of availability in the CIA information security triad?

    • Redundant services, gateways, and links must be implemented.
    • Cryptographic encryption algorithms such as AES may be required to encrypt and decrypt data.
    • Data must be protected from unauthorized alteration.
    • Only authorized individuals, entities, or processes can access sensitive information.
      Explanation & Hints:

      According to the CIA information security triad, the principle of availability means that authorized users must have uninterrupted access to important resources and data. It requires implementing redundant services, gateways, and links.

  25. Which three security services are part of the concept of administrative access controls?

    • authentication, authorization, and accounting
    • data in transit, data at rest, and data in process
    • technology, policy and practices, and people
    • confidentiality, integrity, and availability
      Explanation & Hints:

      Administrative access controls involve three security services: authentication, authorization, and accounting (AAA).

  26. Match the type of firewall to the description.

    • Application Gateway Firewall ==> It filters information on Layers 3, 4, 5, and 7 of the OSI reference model.
    • Stateful Firewall ==> It is usually part of a router firewall, which permits or denies traffic based on Layer 3 and 4 information.
    • Stateless Firewall ==> It is a firewall architecture that is classified at the network layer.
    • Next Generation Firewall ==> It provides application awareness and control to see and block risky apps.
      Explanation & Hints:

      Place the options in the following order:

      Stateless Firewall It is a firewall architecture that is classified at the network layer.
      Stateful Firewall It is usually part of a router firewall, which permits or denies traffic based on Layer 3 and 4 information.
      Application Gateway Firewall It filters information on Layers 3, 4, 5, and 7 of the OSI reference model.
      Next Generation Firewall It provides application awareness and control to see and block risky apps.
  27. Which is an example of a behavioral characteristic?

    • face
    • voice
    • DNA
    • ear features
      Explanation & Hints:

      There are two types of biometric identifiers:

      • Physical characteristics: fingerprints, DNA, face, hands, retina, or ear features.
      • Behavioral characteristics: behavior patterns such as gestures, voice, gait, or typing rhythm.
  28. What is the limitation of using a stateful firewall in a network?

    • Weak packet filtering.
    • Less information is provided in the logs compared to a packet-filtering firewall.
    • No defense against spoofing and DoS attacks.
    • Difficult to defend against dynamic port negotiation.
      Explanation & Hints:

      The limitations of a stateful firewall are:

      • No Application Layer inspection
      • Limited tracking of stateless protocols
      • Difficult to defend against dynamic port negotiation
      • No authentication support
  29. What is one of the safeguards according to the third dimension of the cybersecurity cube?

    • integrity
    • confidentiality
    • technology
    • accountability
      Explanation & Hints:

      The third dimension of the cybersecurity cube defines the pillars on which we need to base our cybersecurity defenses to protect data and infrastructure in the digital realm. These are technology , policy, and practices , and improving people’s education, training, and awareness.

  30. Which Apple security feature ensures that only authentic, digitally-signed software that an Apple-notarized software developer has created is permitted to be installed?

    • Security-focused hardware
    • MRT
    • XProtect
    • Gatekeeper
      Explanation & Hints:

      Gatekeeper, an Apple macOS security feature, ensures that only authentic, digitally-signed software that an Apple-notarized software developer has created can be installed.

  31. What type of connection is used when a teleworker must have secure access to devices and services located on an enterprise network?

    • VPN
    • RTP
    • HTTP
    • FTP
      Explanation & Hints:

      A VPN connection between the teleworker and the enterprise provides a secure connection to the enterprise network. All communications between the entities are encrypted. HTTP and FTP are not secure protocols. RDP provides remote access to a single Windows computer.

  32. Match the examples of cyber threat to the description.

    • utility interruption ==> Water damage resulting from sprinkler failure
    • software error ==> A cross-site script or illegal file server share
    • hardware failure ==> Disk drive crashes
    • human error ==> Inadvertent data entry error
      Explanation & Hints:

      Place the options in the following order:

      Hardware failure Disk drive crashes
      Human error Inadvertent data entry error
      Utility interruption Water damage resulting from sprinkler failure
      Software error A cross-site script or illegal file server share
  33. A secretary receives a phone call from someone claiming that their manager is about to give an important presentation but the presentation files are corrupted.

    The caller sternly asks that the secretary email the presentation right away to a personal email address. The caller also states that the secretary is being held personally responsible for the success of this presentation.

    What type of social engineering tactic is the caller using?

    • familiarity
    • urgency
    • trusted partners
    • intimidation
      Explanation & Hints:

  34. Which statement describes an advanced persistent threat (APT)?

    • an attack by threat actors performing unauthorized network probing and port scanning on the targeted network.
    • an attack that takes advantage of algorithms in a piece of legitimate software to generate unintended behaviors.
    • a continuous attack that uses elaborated espionage tactics involving multiple threat actors and sophisticated malware to gain access to the targeted network.
    • an attack that modifies the operating system through malware and creates a backdoor on the infected system.
      Explanation & Hints:

  35. Which protocol is used by network management systems to collect data from network devices?

    • SMTP
    • RDP
    • TFTP
    • SNMP
      Explanation & Hints:

  36. The awareness and identification of vulnerabilities is a critical function of a cybersecurity specialist. Which of the following resources can they use to identify specific details about vulnerabilities?

    • CVE national database
    • Infragard
    • NIST/NICE framework
    • ISO/IEC 27000 model
      Explanation & Hints:

  37. Match the authentication method to description.

    • WPA2 ==> The current industry standard for securing wireless networks that use AES for encryption.
    • Wi-Fi Protected Access (WPA) ==> A Wi-Fi Alliance standard that uses WEP but secures the data with the much stronger TKIP encryption algorithm.
    • WPA3 ==> This authentication standard requires the use of Protected Management Frames (PMF).
    • Wired Equivalent Privacy (WEP) ==> The original 802.11 specifications were designed to secure the data using the RC4 encryption method with a static key.
      Explanation & Hints:

  38. An administrator wishes to create a security policy document for end-users to protect against known unsafe websites and to warn the user about the dangers and handling of suspicious emails. What type of malware attack is being prevented?

    • phishing
    • adware protection
    • trusted/untrusted sources verification
    • DDoS
5 1 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments