100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cybersecurity Fundamentals Training Exam Questions And 100% Correct Answers. $9.99   Add to cart

Exam (elaborations)

Cybersecurity Fundamentals Training Exam Questions And 100% Correct Answers.

 6 views  0 purchase
  • Course
  • Cyber Security Fundamentals
  • Institution
  • Cyber Security Fundamentals

What does IP stand for? - Answer Internet Protocol What does IP do? - Answer Provides addressing What does TCP stand for? - Answer Transmission control Protocol Physical devices such as transceivers, modems, CSU/DSU are part of what network layer? - Answer Layer 1 What layer...

[Show more]

Preview 3 out of 16  pages

  • September 29, 2024
  • 16
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber Security Fundamentals
  • Cyber Security Fundamentals
avatar-seller
TestSolver9
Cybersecurity Fundamentals Training
Exam Questions And 100% Correct
Answers.
What does IP stand for? - Answer Internet Protocol



What does IP do? - Answer Provides addressing



What does TCP stand for? - Answer Transmission control Protocol



Physical devices such as transceivers, modems, CSU/DSU are part of what network layer? - Answer
Layer 1



What layer do MAC addresses operate on? - Answer The data link layer or layer 2



What 3 things happen on layer 3 of the OSI and TCP/IP network models? - Answer a.)Network provides
connectivity between two hosts on geographically separated networks

b.)selects the best path for data delivery

c.)routes data packets



True or False: DHCP snooping can mitigate a DHCP attack. - Answer True: DHCP snooping can mitigate a
DHCP attack by using a Cisco switch.



After encryption has been applied to a message, what is the message identified as? - Answer
Ciphertext



What does policy NAT - Answer It enables a firewall to perform translations based on a destination
address

,what type of NAT is used for setting up public servers with a one to one relationship? - Answer Static
NAT



what type of cypher arranges or permutates letters? - Answer transposition



what is the type of malware masquerading as a legitimate software, but is malicious when launched? -
Answer trojan



What can be used to determine the type of OS the device is running that can be found within ICMP? -
Answer TTL value



On a multi-layer switch what does the TCAM table do? - Answer this table handles the fowarding of
data with regards to ACLs



The CAM table and the MAC table do what? - Answer identify a MAC address to a port



what is the preferred symmetrical algorithm to replace 3DES? - Answer AES



which OSI model layer is responsible for logical addressing and path selection networks? - Answer
Layer 3



Which form of NAT uses port addresses to distinguish between translated sessions? - Answer Dynamic
PAT , PATs always use ports



What utility can an attacker use to scan the a network in stealth mode? - Answer nmap



what phase of the TCP process is affected by a TCP reset attack? - Answer connection established. the
reset is the part when the communication is being shut down so the attack would falsify a TCP reset
which would cause the connection established phase to drop.



During a TCP SYN flood attack, what phase of the TCP communication process is attacked? - Answer
three-way handshake

, What protocol uses UDP to manage and monitor devices the could be exploited if not secured? - Answer
SNMP ( this is dead :security is not my problem)



What is the well known port of the DNS TCP zone-transfer? - Answer 53



How many bits does an IPv6 address have? - Answer 128



what is the first standard for Spanning Tree that was modeled after Radia Perlmans work while at DEC? -
Answer 802.1D "I have never seen a graph as lovely as a tree"-Radia Perlmans. 802.1D is the first
instance of Spanning Tree



What is the name of Layer 3 of the TCP/ IP model? - Answer The Internet layer



Which field in the IP header is decremented by every router it passes through? - Answer TTL



What TCP port does SSL/ TLS commonly use? - Answer TCP 443



Name the key difference between a MITM attack and an eavesdropping attack. - Answer MITM can
capture data AND can modify the data in transit



Which routing protcol is EIGRP? - Answer advanced distance vector, distance vector is for IGRP



Why would you use a hash algorithm for a message? - Answer Integrity. It guarantees data is not being
modified in transit



what device operates strictly at the physical layer? - Answer Hub



what does "key space" refer to in regards to cryptography? - Answer the number of possible keys
generated by an algorithm

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TestSolver9. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83637 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart