Cybersecurity Fundamentals Training Exam Questions And 100% Correct Answers.
6 views 0 purchase
Course
Cyber Security Fundamentals
Institution
Cyber Security Fundamentals
What does IP stand for? - Answer Internet Protocol
What does IP do? - Answer Provides addressing
What does TCP stand for? - Answer Transmission control Protocol
Physical devices such as transceivers, modems, CSU/DSU are part of what network layer? - Answer Layer 1
What layer...
Cybersecurity Fundamentals Training
Exam Questions And 100% Correct
Answers.
What does IP stand for? - Answer Internet Protocol
What does IP do? - Answer Provides addressing
What does TCP stand for? - Answer Transmission control Protocol
Physical devices such as transceivers, modems, CSU/DSU are part of what network layer? - Answer
Layer 1
What layer do MAC addresses operate on? - Answer The data link layer or layer 2
What 3 things happen on layer 3 of the OSI and TCP/IP network models? - Answer a.)Network provides
connectivity between two hosts on geographically separated networks
b.)selects the best path for data delivery
c.)routes data packets
True or False: DHCP snooping can mitigate a DHCP attack. - Answer True: DHCP snooping can mitigate a
DHCP attack by using a Cisco switch.
After encryption has been applied to a message, what is the message identified as? - Answer
Ciphertext
What does policy NAT - Answer It enables a firewall to perform translations based on a destination
address
,what type of NAT is used for setting up public servers with a one to one relationship? - Answer Static
NAT
what type of cypher arranges or permutates letters? - Answer transposition
what is the type of malware masquerading as a legitimate software, but is malicious when launched? -
Answer trojan
What can be used to determine the type of OS the device is running that can be found within ICMP? -
Answer TTL value
On a multi-layer switch what does the TCAM table do? - Answer this table handles the fowarding of
data with regards to ACLs
The CAM table and the MAC table do what? - Answer identify a MAC address to a port
what is the preferred symmetrical algorithm to replace 3DES? - Answer AES
which OSI model layer is responsible for logical addressing and path selection networks? - Answer
Layer 3
Which form of NAT uses port addresses to distinguish between translated sessions? - Answer Dynamic
PAT , PATs always use ports
What utility can an attacker use to scan the a network in stealth mode? - Answer nmap
what phase of the TCP process is affected by a TCP reset attack? - Answer connection established. the
reset is the part when the communication is being shut down so the attack would falsify a TCP reset
which would cause the connection established phase to drop.
During a TCP SYN flood attack, what phase of the TCP communication process is attacked? - Answer
three-way handshake
, What protocol uses UDP to manage and monitor devices the could be exploited if not secured? - Answer
SNMP ( this is dead :security is not my problem)
What is the well known port of the DNS TCP zone-transfer? - Answer 53
How many bits does an IPv6 address have? - Answer 128
what is the first standard for Spanning Tree that was modeled after Radia Perlmans work while at DEC? -
Answer 802.1D "I have never seen a graph as lovely as a tree"-Radia Perlmans. 802.1D is the first
instance of Spanning Tree
What is the name of Layer 3 of the TCP/ IP model? - Answer The Internet layer
Which field in the IP header is decremented by every router it passes through? - Answer TTL
What TCP port does SSL/ TLS commonly use? - Answer TCP 443
Name the key difference between a MITM attack and an eavesdropping attack. - Answer MITM can
capture data AND can modify the data in transit
Which routing protcol is EIGRP? - Answer advanced distance vector, distance vector is for IGRP
Why would you use a hash algorithm for a message? - Answer Integrity. It guarantees data is not being
modified in transit
what device operates strictly at the physical layer? - Answer Hub
what does "key space" refer to in regards to cryptography? - Answer the number of possible keys
generated by an algorithm
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TestSolver9. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.