Quiz Summary
0 of 16 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 16 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 16
1. Question
A company’s network contains client workstations and database servers in the same subnet. Attackers have breached database servers via compromised workstations. The company improved phishing training and antivirus. What additional change will improve network security?
CorrectIncorrect -
Question 2 of 16
2. Question
A company must store archived data with very high confidentiality and integrity requirements on the same site as production network systems. Which architecture provides the best protection?
CorrectIncorrect -
Question 3 of 16
3. Question
An air-gapped host has no network connection, preventing remote access and significantly reducing attack risk.
CorrectIncorrect -
Question 4 of 16
4. Question
A company wants switches to enforce device authentication. Which standard must the switches support?
CorrectIncorrect -
Question 5 of 16
5. Question
Two companies merge but cannot fit 100 new desktops into the current on-premises networks. Which architectural consideration was overlooked?
CorrectIncorrect -
Question 6 of 16
6. Question
Scalability ensures that the network can grow to accommodate additional users, devices, or workloads.
CorrectIncorrect -
Question 7 of 16
7. Question
A proxy server must stop all access if compromised. Which fail mode should be configured?
CorrectIncorrect -
Question 8 of 16
8. Question
You want to deploy a WAF appliance without changing layer 3 addressing. Which attribute must it support?
CorrectIncorrect -
Question 9 of 16
9. Question
Which IPS mechanism can block violating traffic without blocking the source?
CorrectIncorrect -
Question 10 of 16
10. Question
Resetting connections stops prohibited activity while allowing legitimate traffic from the same source to continue.
CorrectIncorrect -
Question 11 of 16
11. Question
In load balancing, what does “scheduling” refer to?
CorrectIncorrect -
Question 12 of 16
12. Question
True or False: A TLS VPN can only provide access to web-based resources.
CorrectIncorrect -
Question 13 of 16
13. Question
Which IPsec mode should be used for confidentiality on a private network?
CorrectIncorrect -
Question 14 of 16
14. Question
What is the main advantage of IKEv2 over IKEv1?
CorrectIncorrect -
Question 15 of 16
15. Question
What value confirms an SSH server’s identity to a client?
CorrectIncorrect -
Question 16 of 16
16. Question
Server A forwards SSH commands to a pool of database servers that accept SSH only from Server A. What is this configuration called?
CorrectIncorrect