IT CertificationsComprehensive Study Set

When Does Comptia Security+ 601 Expire

294 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What type of certificate does a CA have?

ANSWER

Root Certificate; used to sign keys

QUESTION 2

If I am going to use a CA internally, what type of CA should I use?

ANSWER

Private CA

QUESTION 3

If I want to carry out a B2B activity with third-party companies or sell products on the web, what type of certificate should I use?

ANSWER

Public CA

QUESTION 4

Why would I make my CA offline when not in use?

ANSWER

Military, Security, or Banking Organizations; preventing data from being compromised.

QUESTION 5

Who signs X.509 certificates?

ANSWER

Central Authorities (CA)

QUESTION 6

Who builds the CA or intermediate authorities?

ANSWER

Architect

QUESTION 7

What can I use to prevent my CA from being compromised and fraudulent certificates being issued?

ANSWER

Certificate Pinning

QUESTION 8

If two entities what to set up a cross-certification, what must they set up first?

ANSWER

Root CAs using a bridge trust model

QUESTION 9

What type of trust model does PGP use?

ANSWER

Web of Trust

QUESTION 10

How can I tell if my certificate is valid?

ANSWER

Certificate Revocation List (CRL)

QUESTION 11

If the CRL is going slow, what should I implement?

ANSWER

Online Certification Status Protocol (OCSP)

QUESTION 12

Explain certificate stapling/OCSP stapling

ANSWER

Web servers use an OCSP for faster authentication bypassing the CRL

QUESTION 13

What is the process of obtaining a new certificate

ANSWER

Certificate Signing Request (CSR)

QUESTION 14

What is the purpose of key escrow?

ANSWER

Holds an provides access to 3rd party keys provided the need.

QUESTION 15

What is the purpose of Hardware Security Model (HSM)

ANSWER

Used by key escrow to store and manage keys

QUESTION 16

What is the purpose of DRA and what does it require in order to complete its role effectively?

ANSWER

When a users private key becomes corrupt, the DRA recovers data by obtaining a copy of the private key from the key escrow.

QUESTION 17

How can I identify each certificate

ANSWER

Object Identifier (OID) or the serial number

QUESTION 18

What format is a private certificate?

ANSWER

P12

QUESTION 19

What file extension is a private certificate?

ANSWER

.pfx extension

QUESTION 20

What format is a public certificate?

ANSWER

P7B

QUESTION 21

What file extension is a public certificate?

ANSWER

.cer extension

QUESTION 22

What format is a PEM certificate?

ANSWER

Base64

QUESTION 23

What type of certificate can be used on multiple servers in the same domain

ANSWER

Wildcard (denoted by a *)

QUESTION 24

What type of certificate can be used on multiple domains?

ANSWER

Subject Alternative Name (SAN)

QUESTION 25

What should I do with my software to verify that it is original and not a fake copy (verify integrity)?

ANSWER

Code Signing

QUESTION 26

What is the purpose of extended validation of an X.509 certificate?

ANSWER

Provides Financial institutions with a higher level of trust.

QUESTION 27

What is the purpose of DH?

ANSWER

Creates a secure tunnel; during a VPN connection (on port 500), used during IKE

QUESTION 28

What two things does digitally signing an email provide?

ANSWER

Integrity and Non-repudiation

QUESTION 29

What asymmetric encryption algorithm should I use to encrypt data on a smartphone?

ANSWER

ECC (Elliptic Curve Cryptography)

QUESTION 30

What shall I use to encrypt a military mobile phone?

ANSWER

AES-256

QUESTION 31

Name two key stretching algorithms

ANSWER

Bcrypt & PBKDF2

QUESTION 32

What is the purpose of key stretching?

ANSWER

To make weak passwords less volatile to brute-force attacks

QUESTION 33

What happens to Cipher Block Chaining (CBC) if I do not have all the blocks?

ANSWER

No decryption is possible

QUESTION 34

If I want to ensure integrity of data, what shall I use?

ANSWER

MD5 & SHA-1

QUESTION 35

What type of man-in-the-middle (MITM) attack is SSL 3.0 (CBC) vulnerable to?

ANSWER

POODLE

QUESTION 36

What is the usage of Diffie Hellman Ephemeral (DHE) and Elliptic Curve Diffie Hellman Ephemeral (ECDHE)

ANSWER

one time keys

QUESTION 37

What is the strongest method of encryption with an L2TP/IPSec VPN Tunnel

ANSWER

AES

QUESTION 38

What is the weakest method of encryption with an L2TP/IPSec VPN Tunnel

ANSWER

DES

QUESTION 39

What is the name of the key used to ensure the security of communication between a computer and a server or a computer to another computer?

ANSWER

Session key

QUESTION 40

What should I do to protect data at rest on a laptop?

ANSWER

Full Disk Encryption (FDE)

QUESTION 41

What should I do to protect data at rest on a tablet or smartphone?

ANSWER

Full Device Encryption (FDE)

QUESTION 42

What should I do to protect data at rest on a backend server?

ANSWER

Ensure database encryption

QUESTION 43

What should I do to protect data at rest on a removable device, such as a USB drive or external hard drive?

ANSWER

Data Loss Prevention (DLP) or FDE

QUESTION 44

What two protocols protect data in transit?

ANSWER

Transport Layer Security (TLS) or HTTPS

QUESTION 45

How can I protect data in use?

ANSWER

Full memory encryption

QUESTION 46

What is the purpose of obfuscation?

ANSWER

Provided source code is compromised the code will be obscure; using either XOR or ROT13.

QUESTION 47

What is the purpose of perfect forward secrecy?

ANSWER

There is no link between the server's session key and the private key.

QUESTION 48

What type of attack tries to find two has values that match?

ANSWER

Collision attack

QUESTION 49

What is the purpose of rainbow tables?

ANSWER

Maintain a precomputed table of hash values for words

QUESTION 50

Explain the purpose of password salting

ANSWER

ensures that duplicate passwords are never stored. increases the key size making it less vulnerable to brute-force attacks.

QUESTION 51

What is the most common form of authentication that is most likely to be entered incorrectly

ANSWER

password

QUESTION 52

When I purchase a new wireless access point, what should I do first?

ANSWER

Change default credintials

QUESTION 53

What is password history?

ANSWER

The number of passwords you can use before using the current password

QUESTION 54

How can I prevent someone from reusing the same password?

ANSWER

Adjusting the minimum password age

QUESTION 55

Explain what format a complex password takes.

ANSWER

Uses 3 of the following: 1. Uppercase 2. Lowercase 3. Number 4. Special Character

QUESTION 56

How can I prevent a hacker from inserting a password multiple times?

ANSWER

Account lockout - threshold

QUESTION 57

What type of factor authentication is a smart card?

ANSWER

Multi-factor or dual factor

QUESTION 58

What authentication method can be used by two third parties that participate in a joint venture?

ANSWER

federation

QUESTION 59

What is an XML-based authentication protocol

ANSWER

Security Assertion Markup Language (SAML)

QUESTION 60

What is Shibboleth?

ANSWER

Open source federation that uses SAML authentication

QUESTION 61

What protocol is used to store and search for Active Directory (AD) objects

ANSWER

LDAP

QUESTION 62

What authentication factor uses tickets, timestamps, and updated sequence numbers and is used to prevent replay attacks?

ANSWER

Kerberos

QUESTION 63

What is a Ticket Granting Ticket (TGT) session?

ANSWER

User sends there credentials (username and password) to a domain controller that authenticates and provides a receive ticket allowing user access to the session.

QUESTION 64

What is single sign-on? Give two examples?

ANSWER

Kerberos & Federation Services

QUESTION 65

How can I prevent a pass-the-hash attack?

ANSWER

Not enabling NTLM

QUESTION 66

Give an example of when you would use Open ID connect

ANSWER

When you need to access a device using 3rd party credentials (sign-in with google)

QUESTION 67

Name two AAA servers and the ports associated with them.

ANSWER

TACACS+ on port 49 RADIUS on port 1812

QUESTION 68

What is used for accounting in an AAA server?

ANSWER

RADIUS on port 1813

QUESTION 69

What is the purpose of a VPN solution?

ANSWER

Secure connection for a remote location

QUESTION 70

Why should we never use PAP authentication?

ANSWER

Passwords are transmitted in plain text

QUESTION 71

What is Type II in biometric authentication an why is it a security risk?

ANSWER

Failure acceptance rate

QUESTION 72

What is a time-limited password?

ANSWER

Password is only available for a limited amount of time

QUESTION 73

How many times can you use an HOTP password? Is there a time restriction?

ANSWER

One time; there is no time before it expires

QUESTION 74

How does a CAC differ from a smart card and who uses a CAC?

ANSWER

Military personal

QUESTION 75

What type of account is a service account?

ANSWER

An administrative account that allows for an application to run with higher privileges. (firewall)

QUESTION 76

How many accounts should a system administrator have?

ANSWER

Two accounts one for day-to-day and one for admin. task

QUESTION 77

What do I need to do when I purchase a baby monitor?

ANSWER

Change the default username and password

QUESTION 78

What is a privileged account?

ANSWER

Account with administrative rights

QUESTION 79

What is the drawback for security if the company uses shard accounts?

ANSWER

When auditing account the activity cannot be traced to a single user

QUESTION 80

The system administrator in a multinational corporation creates a user account using an employee's first name and last name. Why are they doing this time after time?

ANSWER

Standard naming conventions

QUESTION 81

What two actions do I need to complete when John Smith leaves the company?

ANSWER

Disable his account and reset the password

QUESTION 82

What is account recertification?

ANSWER

Audit of user account and privileges

QUESTION 83

What is the purpose of a user account review?

ANSWER

Ensures old accounts are deleted and current users have correct privileges

QUESTION 84

What can I implement to find out immediately when a user is placed in a group that may give them a hight level of privilege?

ANSWER

SIEM System

QUESTION 85

What will be the two possible outcomes if an auditor finds any working practices that do not confirm to the companies policy?

ANSWER

Either change of management or new policies

QUESTION 86

If a contractor brings in five consultants for two months of mail server migration, how should I set up their accounts?

ANSWER

Accounts should be set up to expire on or before the last day of the contract.

QUESTION 87

How can I ensure that users are only allowed access to the company network between the times of 9:00am - 5:00pm?

ANSWER

Rule-based access control that only allows for activity durning this time

QUESTION 88

If I have a company that has five consultants who work in different shift patterns, how can I set up their accounts so that each of them can only access the network during thier individual shift?

ANSWER

Time of day restrictions that align with their schedules

QUESTION 89

A brute-force attack cracks a password using all combinations of characters and will eventually crack a password. What can I do to prevent brute-force attacks?

ANSWER

Account lockout

QUESTION 90

The IT team have a global group called IT Admin; each member of the IT team are members of this group and therefore have full control access to the departmental data. Two new apprentices are joining the company and they need to have read access to the IT data. How can you achieve this with the minimum amount of administrative effort?

ANSWER

Create a group account with only the privileges required

QUESTION 91

I have different login details and passwords to access Airbnb, Twitter, Facebook, and Google but I keep getting them mixed up and have locked myself out of these accounts from time to time. What can I implement on my Windows 10 laptop to help me?

ANSWER

Credential Manager

QUESTION 92

I have moved departments, but the employees in my old department still use my old account for access; what should the company have done to prevent this from happening? What should their next action be?

ANSWER

Disable and lock out the account. The next action should be an account review.

QUESTION 93

What is the purpose of ssh-copy-id command

ANSWER

The purpose is to copy and install public keys on a SSH server, and add to the list of authorized keys.

QUESTION 94

When I log in to my Dropbox account from my phone, I get an email asking me to confirm that this was a legal login. What have I been subjected to?

ANSWER

Risky login

QUESTION 95

What is the purpose of a password valut and how secure is it?

ANSWER

The purpose is to store passwords and keys. It is only as secure as the master key.

QUESTION 96

What type of knowledge-based authentication would a bank normally use?

ANSWER

Dynamic KBA that asks questions that have not already been answered

QUESTION 97

What is a solution that helps protect privilege accounts?

ANSWER

Privileged access management stores privilege accounts in a bastion domain.

QUESTION 98

FAR

ANSWER

False Acceptance Rate

QUESTION 99

FRR

ANSWER

False rejection rate. Also called the false nonmatch rate. A rate that identifies the percentage of times a biometric authentication system incorrectly rejects a valid match.

QUESTION 100

Why do cloud providers adopt a zero-trust model?

ANSWER

They treat every login as unsafe to prevent unauthorized attempts at login

QUESTION 101

What authentication model gives access to computer system even though the wrong credentials are being used?

ANSWER

Biometric authentication

QUESTION 102

In a cloud environment what is elasticity?

ANSWER

Allows you to increase or decrease the cloud resources as you need

QUESTION 103

In which cloud environment would I install the software and then have to update the patches?

ANSWER

Infrastructure as a Service (IaaS)

QUESTION 104

What cloud model would I not be allowed to migrate to?

ANSWER

Software as a Service (SaaS)

QUESTION 105

What is the major benefit of using a public cloud?

ANSWER

No capital expenditures

QUESTION 106

What is a cloud single-tenant model?

ANSWER

Private cloud were you own and the infastructure

QUESTION 107

What is a cloud multitenant model?

ANSWER

Public Cloud

QUESTION 108

Describe how community cloud operates.

ANSWER

Where people from the same industry design and share the cost of a bespoke application and its hosting.

QUESTION 109

Who is responsible for disaster recovery of hardware in a cloud environment?

ANSWER

Cloud Service Provider (CSP)

QUESTION 110

What is a Cloud Access Security Broker (CASB)?

ANSWER

person who ensures that the policies between on-premise and the cloud are followed

QUESTION 111

What model is it if you own the premise and all of the IT infrastructures reside there?

ANSWER

On-premise

QUESTION 112

What is a hybrid cloud model?

ANSWER

Where a company uses a mix of on-premise and the cloud

QUESTION 113

What is distributive allocation?

ANSWER

Ensures that the load is spread evenly among resources. Ensuring that no one resource gets overloaded. Ex. load balancer.

QUESTION 114

What type of model deals with Identity and Access Management?

ANSWER

Security as a Service (SECaaS)

QUESTION 115

Where will a diskless virtual host access its storage?

ANSWER

Storage Area Network (SAN)

QUESTION 116

If you have a virtual switch that resides on a SAN, what connector will you use for a VLAN?

ANSWER

iSCSI

QUESTION 117

What type of disks does a SAN use?

ANSWER

Fast disk, SSDs

QUESTION 118

What is the machine that holds a number of VMs called?

ANSWER

Host; needs to have fast CPU, memory, and disk speed

QUESTION 119

What is a guest, and what can you use as a rollback option?

ANSWER

A guest is a Virtual Machine (VM); and you can use snapshots for roll backs.

QUESTION 120

In a virtual environment what is a sandbox and how does it relate to chroot jail?

ANSWER

A sandbox is a separation of the Virtual Machine from the rest of the environment. Chroot jail is the Linux version of a sandbox.

QUESTION 121

Which is faster for data recovery: a snapshot or a backup tape?

ANSWER

Snapshoot

QUESTION 122

What is a Type 1 Hypervisor?

ANSWER

Bare-metal hypervisor that doesn't need to be installed on an OS; examples include Hyper-V, ESX, Xen.

QUESTION 123

What is a Type 2 Hypervisor?

ANSWER

Must be installed on a OS; examples include VirtualBox

QUESTION 124

Why does HVAC produce availability for a data center?

ANSWER

HVAC supplies cold air and removes hot air

QUESTION 125

What do you call the cloud model where people from the same industry share resources and the cost of the cloud model?

ANSWER

Community Cloud

QUESTION 126

What is an example of cloud storage for a personal user?

ANSWER

iCloud, Google Drive, OneDrive, Dropbox

QUESTION 127

Explain the functionality of Fog Computing.

ANSWER

Is an intermediary between the device and the cloud. It allows the data to be processed closer to the device.

QUESTION 128

What is edge computing?

ANSWER

It allows data to be stored closer to the sensors rather than miles away in a data center

QUESTION 129

What are containers?

ANSWER

Allows for the isolation of the applications and its files and libraries so the application is independent

QUESTION 130

What is infrastructure as code?

ANSWER

This allows for the automation of your infrastructure

QUESTION 131

What are cloud resource policies?

ANSWER

The combination of business and IT functions into a single business solution

QUESTION 132

What is system sprawl, and what is a way to prevent it?

ANSWER

This is where a virtual machine or host has run out of resources. The best way to mitigate is to use thin provisioning.

QUESTION 133

What is the best way to protect against VM escape?

ANSWER

VM escape is where an attacker will use a vulnerable VM to attack the host of another VM. Best protection is to ensure the hypervisor and all VMs are fully patched.

QUESTION 134

What is a cloud region, and how can it provide redundancy?

ANSWER

A region consisting of multiple physical location called zones; data can be spread across multiple zones to provide redundancy.

QUESTION 135

What is secret management and why encryption levels protect the secret management key?

ANSWER

Uses a vault to store keys, passwords, tokens, and SSH keys used for privileged accounts. It uses RSA-2048 bit keys

QUESTION 136

Explain the main difference between LRS and ZRS. Which one is the cheapest?

ANSWER

LRS replicates three copies of your data in a physical location (the cheapest). ZRS replicates three copies of your data to three separate zones within your region.

QUESTION 137

Why would a VPC use private and public subnets?

ANSWER

It would be used as a form of network segmentation

QUESTION 138

What types of resources would be held on a public subnet?

ANSWER

Resources that need access to the internet for example, company web servers, a NAT gateway and an internet gateway.

QUESTION 139

What types of resources would be held on a private cloud?

ANSWER

Resources that should not have direct internet access, such as database servers, domain controllers, and email servers.

QUESTION 140

How would someone connect to a VPC?

ANSWER

A VPN connection using L2TP/IPSec

QUESTION 141

Where should a default route be pointing for a device within a private subnet, and what is its purpose?

ANSWER

The default route should be set to 0.0.0.0 pointing either to the NAT gateway or the internet gateway. The purpose is so that when traffic does not know where to go it has a last resort.

QUESTION 142

Why might a third-party cloud solution be better than a cloud-native solutions?

ANSWER

A third-party will offer more flexibility

QUESTION 143

Which pen tester would be given source code?

ANSWER

White box pen tester

QUESTION 144

Why would a shared account pose a problem to monitoring?

ANSWER

Prevents from monitoring an auditing of an individual

QUESTION 145

Which pen tester would be given no access prior to test but, at the last minute is given a diagram of the desktop?

ANSWER

Grey box pen tester

QUESTION 146

What needs to be established prior to a pen test commencing?

ANSWER

Rules of Engagement

QUESTION 147

While carrying out an unannounced pen test, how does the tester know if the internal security are on to him?

ANSWER

He would hold regular meetings with the client to determine if he has been detected.

QUESTION 148

What is the scope of rules of engagement?

ANSWER

The scope determines if the tester is black, grey, or white.

QUESTION 149

If the pen test has been announced to the IT team, what information should they provide regarding the test prior to the testing starting?

ANSWER

They should provide their IP address

QUESTION 150

At what phase of a pen test does the tester return the system back to the original state or inform the IT team of vulnerabilities that need patching?

ANSWER

Clean-up phase

QUESTION 151

What is OSINT? Is it legal?

ANSWER

Open Source Intelligence (OSINT) and yes it is legal

QUESTION 152

What is the purpose of red team?

ANSWER

They serve as the attackers

QUESTION 153

What is the purpose of blue team?

ANSWER

They serve as the defenders

QUESTION 154

What is the purpose of white team?

ANSWER

They judge and organize the cybersecurity events. Ensuring that reports are accurate & countermeasures are recommended.

QUESTION 155

What is the purpose of the purple team?

ANSWER

They play both attacker and defender; typically this is an auditor

QUESTION 156

When evaluating CVSS scores, which vulnerability should be addressed first?

ANSWER

Critical

QUESTION 157

Describe a false positive

ANSWER

When monitoring the network via the SIEM system and it alerts of an attack, but upon manual inspection there is none.

QUESTION 158

Describe a true positive

ANSWER

When the SIEM system and manual check agree

QUESTION 159

What is the difference between an intrusive and non-intrusive scan?

ANSWER

Intrusive scans attempt to do damage with vulnerabilities they find. Non-intrusive scans passively scan not causing damage.

QUESTION 160

What is regression testing and who will carry it out?

ANSWER

When a developer test the code written to ensure there are no flaws

QUESTION 161

When would dynamic analysis be carried out?

ANSWER

When you evaluate a program in real time

QUESTION 162

What is a syslog and what purpose does it server?

ANSWER

Syslog's collect data from the system and log important events. That data is then forwarded to the SIEM for further analysis.

QUESTION 163

Why does a SIEM server rely upon synchronized time clocks between all of the servers and devices that it collects data from?

ANSWER

Events are put in chronological order

QUESTION 164

What is the purpose of threat hunting?

ANSWER

A company does this to check if they have been subject to a cyber attack.

QUESTION 165

SSH

ANSWER

Secure remote access; port 22

QUESTION 166

SCP

ANSWER

Secure copy protocol; TCP port 22

QUESTION 167

SFTP

ANSWER

Secure (SSH) FTP download; TCP port 22

QUESTION 168

DNSSEC

ANSWER

Secure DNS traffic every DNS record is digitally signed with a RRSIG record; TCP/UDP port 53

QUESTION 169

Kerberos

ANSWER

Secure authentication; TCP port 88

QUESTION 170

SNMPv3

ANSWER

Simple Network Management Protocol version 3. A protocol used to monitor and manage network devices; UDP port 162

QUESTION 171

LDAPS

ANSWER

Secure LDAP; TCP 389

QUESTION 172

HTTPS

ANSWER

secure web browsing; TCP port 443

QUESTION 173

TLS

ANSWER

secure data in transit; TCP port 443

QUESTION 174

IPSec

ANSWER

secure session for VPN or between two host using Authenticated Header (AH) and Encapsulated Security Payload (ESP); UDP 500

QUESTION 175

SMTPS

ANSWER

Secure SMTP; TCP port 587

QUESTION 176

IMAP4

ANSWER

Secure IMAP4; TCP port 993

QUESTION 177

Secure POP3

ANSWER

TCP port 995

QUESTION 178

S/MIME

ANSWER

Encrypt or digitally sign email using PKI; TCP port 993

QUESTION 179

FTPS

ANSWER

File transfer protocol security; download large files securely; TCP port 989 data channel/990 control channel

QUESTION 180

Remote Desktop Protocol (RDP)

ANSWER

Microsoft remote access; TCP port 3389

QUESTION 181

Session Initiated Protocol (SIP)

ANSWER

connects internet-based calls; TCP port 5060/61

QUESTION 182

Secure Real-time Transport Protocol (SRTP)

ANSWER

secure voice traffic; TCP port 5061

QUESTION 183

File Transfer Protocol (FTP)

ANSWER

File transfer - passive FTP; TCP port 21

QUESTION 184

Telnet

ANSWER

Run commands on remote host; TCP port 23

QUESTION 185

Simple Mail Transfer Protocol (SMTP)

ANSWER

Transport mail between mail servers; TCP port 25

QUESTION 186

DNS

ANSWER

host name resolution, zone transfers, and name queries; TCP/UDP port 53

QUESTION 187

Dynamic Host Configuration Protocol (DHCP)

ANSWER

Automatic IP address allocation; UDP port 67/68

QUESTION 188

Trivial File Transfer Protocol (TFTP)

ANSWER

File transfer using UDP; UDP port 69

QUESTION 189

Hyper Text Transfer Protocol (HTTP)

ANSWER

Web browser; TCP port 80

QUESTION 190

POP3

ANSWER

Pull mail from mail server, no copy left on mail server; TCP port 110

QUESTION 191

Network Time Protocol (NTP)

ANSWER

time synchronization; TCP port 123

QUESTION 192

NETBIOS

ANSWER

network BIOS to IP address resolution; UDP port 137-139

QUESTION 193

SNMP (Simple Network Management Protocol)

ANSWER

notifies the status and creates reports on network devices; UDP port 161

QUESTION 194

LDAP

ANSWER

Stores x500 objects, searches directory services for users and groups and other information; TCP port 389

QUESTION 195

DNS Record Type A

ANSWER

IPv4 host

QUESTION 196

DNS Record Type AAAA

ANSWER

IPv6 host

QUESTION 197

DNS Record Type CNAME

ANSWER

Alias

QUESTION 198

DNS Record Type MX

ANSWER

Mail Server

QUESTION 199

DNS Record Type SRV Records

ANSWER

Finds Services such as a domain controller

QUESTION 200

MAC Flooding

ANSWER

where a switch is flooded with a high volume of MAC addresses; DDoS attack

QUESTION 201

What is the authentication protocol that uses tickets and prevents replay attacks?

ANSWER

Kerberos

QUESTION 202

Describe how IPSec tunnel mode works.

ANSWER

Typically used for external VPNs. Both the AH and ESP are encrypted

QUESTION 203

Describe how IPSec transport mode works.

ANSWER

Typically used internally between two servers were only the ESP is encrypted

QUESTION 204

If an IT administrator uses Telnet to run remote commands on a router, which secure protocol can it be replaced with?

ANSWER

SSH

QUESTION 205

What is the purpose of a router?

ANSWER

Connect external networks and route IP packets

QUESTION 206

What is the purpose of a switch?

ANSWER

Internal devices that connect computers in the same location

QUESTION 207

What type of service is Spotify?

ANSWER

subscription service

QUESTION 208

Explain how port security works.

ANSWER

Where a port on a switch is disable preventing the use of a the corresponding wall jack.

QUESTION 209

Describe how a managed switch with 802.1x works.

ANSWER

802.1x authenticates users and devices connecting to a switch. If the user does not have a certificate then they are unable to connect to the switch.

QUESTION 210

Which protocol can I use to prevent DNS poisoning?

ANSWER

DNSSEC

QUESTION 211

What are two reasons why a computer might not receive an IP address from a DHCP server?

ANSWER

Resource exhaustion or network connectivity

QUESTION 212

What type of server would both an SIEM server and Microsoft Domain Controller benefit from having installed on their network?

ANSWER

Kerberos server

QUESTION 213

If two companies rented offices on the same floor, what could the building administrator implement to isolate them from each other

ANSWER

VLANs

QUESTION 214

What is the purpose of STP?

ANSWER

Spanning Tree Protocol is used to prevent redundant network paths and looping that slows down performance.

QUESTION 215

If a network administrator wanted to collect the statuses and reports of network devices what secure protocol could they use?

ANSWER

SMTPv3

QUESTION 216

If a network administrator wants to set up a VPN, what is the most secure protocol that they can use?

ANSWER

AES-256 for L2TP/IPSec VPN

QUESTION 217

Which secure protocol can be used to prevent a pass-the-hash attack?

ANSWER

Kerberos

QUESTION 218

Which protocol protects data in transit?

ANSWER

TLS

QUESTION 219

Which protocol can be used to digitally sign email between two parties?

ANSWER

S/MIME

QUESTION 220

Which protocol can be used to secure video conferencing?

ANSWER

SRTP

QUESTION 221

Which protocol allows a user to put a Skype session on hold, speak to another person, and then come back to the first caller?

ANSWER

SIP

QUESTION 222

A system administrator is managing a directory service using a protocol that uses TCP port 389. What protocol are they using and which protocol can be used to carry out the same task securely?

ANSWER

LDAP on 389 can be replaced with LDAPS on port 636

QUESTION 223

What protocol can be used to transfer files remotely?

ANSWER

FTPS

QUESTION 224

Ping

ANSWER

used to test the connectivity to another host. Maximum Total Time to Live is 128 seconds

QUESTION 225

ping -t

ANSWER

is used for diagnostic testing; continuous ping

QUESTION 226

hping

ANSWER

used as a TCP/IP packet analyzer and assembler.

QUESTION 227

tracert/traceroute

ANSWER

shows the route taken from a computer to a website.

QUESTION 228

pathping

ANSWER

calculates the statistic of the trace, and shows the loss at each router

QUESTION 229

Netstat

ANSWER

shows the established connections and the listening ports

QUESTION 230

nslookup

ANSWER

diagnostic tool for verifying the IP address of a hostname in the DNS server database

QUESTION 231

dig

ANSWER

linux/unix version of nslookup

QUESTION 232

arp

ANSWER

is used to translate IP addresses to Mac addresses.

QUESTION 233

arp -a

ANSWER

command shows the arp cach

QUESTION 234

ipconfig/ifconfig

ANSWER

shows the ip configuration on windows and linux/unix uses both.

QUESTION 235

ipconfig /displaydns

ANSWER

displays all cached dns entries in a windows system

QUESTION 236

ipconfig /flushdns

ANSWER

Flush the DNS resolver cache

QUESTION 237

tcpdump

ANSWER

this is used by linux/unix as a packet sniffer command

QUESTION 238

tcpdump -i <interface name>

ANSWER

shows the packet traffic information on the interface

QUESTION 239

nmap

ANSWER

is an open source network mapper. It can create an inventory of all the devices on your network; can be used for banner grabbing

QUESTION 240

netcat

ANSWER

shows network connections in a linux/unix environment

QUESTION 241

netcat -z <port range>

ANSWER

allows you to see the statistic regarding the ports in the specified range

QUESTION 242

curl -s

ANSWER

is used to fetch remote banner information from web servers; this is silent mode

QUESTION 243

curl -I

ANSWER

fetches the HTTP headers

QUESTION 244

sfc /scannow

ANSWER

replaces corrupted files with a copy held in a compressed folder in system32

QUESTION 245

cat

ANSWER

allows for you to view and concatenate files

QUESTION 246

Class A private address range

ANSWER

10.0.0.0 - 10.255.255.255

QUESTION 247

Class B private address range

ANSWER

172.16.0.0 - 172.31.255.255

QUESTION 248

Class C private address range

ANSWER

192.168.0.0 - 192.168.255.255

QUESTION 249

What is the purpose of a web application firewall and where is it normally place?

ANSWER

Normally placed on a web server it protects web applications from attacks

QUESTION 250

What is implicit deny and which two devices does it affect?

ANSWER

Used by firewalls and routers implicit deny is when there is no rule for traffic thus it is just denied

QUESTION 251

What is the firewall that does content filtering, URL filtering, and malware inspection?

ANSWER

Unified Threat Management (UTM) Firewall

QUESTION 252

What network device connects two networks together?

ANSWER

Router (Layer 3)

QUESTION 253

What type of internal device connects users on the same network?

ANSWER

Switch

QUESTION 254

Which type of device hides the internal network from hackers on the internet?

ANSWER

Network Address Translation (NAT); private IP addresses are changed to a singular public address that is visible on the network

QUESTION 255

What is an inline NIPS?

ANSWER

Where the incoming traffic is screened by the Network IPS (NIPS)

QUESTION 256

What type of IPS protects virtual machines from attack?

ANSWER

Host-based IPS (HIPS)

QUESTION 257

Which type of IPS is placed behind the firewall as an additional layer of security?

ANSWER

NIPS

QUESTION 258

If I don't have a NIDS on my network, which device can passively monitor network traffic?

ANSWER

A passive NIPS can provide the same functionality

QUESTION 259

What is the difference between a signature and anomaly-based NIDS?

ANSWER

Signature based NIDS work only on a database of defined threats. Anomaly-based NIDS have a baseline database of threats but can detect threats outside of this baseline

QUESTION 260

What is the passive device that sits on your internal network?

ANSWER

NIDS

QUESTION 261

If I receive an alert that server1 has a virus and I inspect the server ad there are no viruses, what is this known as?

ANSWER

False Positive

QUESTION 262

How can I prevent someone from accessing a medical center's network by plugging their laptop into a port in the waiting room?

ANSWER

Enabling port security; this turns off selected ports on a switch

QUESTION 263

How can I prevent someone from plugging a rouge access point into my network?

ANSWER

Enabling 802.1x security on a managed switch. 802.1x relies on authentication of devices before allowing use to the desired port

QUESTION 264

How do 802.1x and port security differ? Which one gives more functionality

ANSWER

802.1x keeps ports active and disallows access if the device connecting cannot be authenticated. Port security disables ports entirely. 802.1x is more functional

QUESTION 265

What happens in the IKE phase of a VPN session?

ANSWER

DH uses UDP port 500 to establish a secure connection

QUESTION 266

What is the purpose of a VPN concentrator?

ANSWER

Sets up the secure session for a VPN

QUESTION 267

What is the most secure VPN tunneling protocol?

ANSWER

L2TP/IPSec using AES 256 to encrypt the ESP

QUESTION 268

What modes would you use in L2TP/IPSec tunnel over the internet and then internally?

ANSWER

External Tunnel = Tunnel mode Internal Tunnel = Transport mode

QUESTION 269

Which VPN session type would you use on a site-to-site VPN?

ANSWER

The session type should be switched to always-on mode.

QUESTION 270

What network device would be used to manage a high volume of web traffice?

ANSWER

Load balancer

QUESTION 271

What type of network is used by a virtual network so that the route requests are forwarded to a controller?

ANSWER

Software Designed Network (SDN)

QUESTION 272

What is the purpose of a screened subnet and what type of web server is located there?

ANSWER

It is a boundary layer that host an extranet server, this is also know as the extranet zone, or DMZ

QUESTION 273

If I want to find out what attack methods a potential hacker is using, what do I need to set up?

ANSWER

Honeypot

QUESTION 274

What is the purpose of network access control? Name two agents that it uses.

ANSWER

Ensures that devices that are connecting are fully patched. Ex. permanent and disposable

QUESTION 275

What type of device can be used to automate the collection of log files across many different devices?

ANSWER

SIEM server

QUESTION 276

If I wanted to back up data to a backup device but, at the same time, prevent someone from deleting the data, what device do I need to use?

ANSWER

Write-once-read-many (WORM)

QUESTION 277

Explain the port mirror process and name another device that could be used for the same process?

ANSWER

In this process data going to a port is copied and sent to another device for analysis. A tap is an example of another device

QUESTION 278

What type of records are created by DNSSEC?

ANSWER

A RRSIG record is created for every DNS host and a DNSKEY is used in signing KSK and ZSK

QUESTION 279

What are the two portions of an IPSec packet?

ANSWER

The authentication header (AH) using MD5 or SHA-1 encryption, and the ESP using DES, 3DES, or AES encryption

QUESTION 280

What type of IP address is 2001:123A:0000:0000:ABC0:0DCS:0023 and how can we simplify it?

ANSWER

This is an IPv6 address and it can be simplified into 2001:123A::ABC0:DCS:23

QUESTION 281

What is the benefit of HTML 5 VPN?

ANSWER

It requires no infrastructure to set up.

QUESTION 282

What mode is an L2TP/IPSec VPN if it encrypts both the header and the payload?

ANSWER

Tunnel

QUESTION 283

What is the purpose of a jump server?

ANSWER

It allows for remote SSH sessions on a screened subnet or cloud

QUESTION 284

What is load balancing persistence or affinity?

ANSWER

Where the host is sent to the same server for the session

QUESTION 285

What is the downside to using two load balancers in an active/active model?

ANSWER

They both balance loads near capacity; if one load balancer fails the network traffic is very slow

QUESTION 286

Three different groups of workers are in an open plan office and they are all connected to the same physical switch. What can be done to isolate them from each other?

ANSWER

VLANs

QUESTION 287

How does East-West traffic operate?

ANSWER

Laterally (internally) to other servers in a data center

QUESTION 288

What is a zero-trust model and where is it likely to be used?

ANSWER

No traffic is trusted and all traffic must be authenticated. This is commonly used in the cloud

QUESTION 289

Why would someone use Angry IP?

ANSWER

To scan a range of IP addresses to check if any of them are active or not

QUESTION 290

When would someone use the harvester tool?

ANSWER

To collect email addresses from a particular domain

QUESTION 291

How can an attacker find the DNS records from your domain?

ANSWER

Dnsenum

QUESTION 292

Why would I use the scanless tool?

ANSWER

So the scan usage cannot be traced to me

QUESTION 293

What is the purpose of DHCP snooping?

ANSWER

to prevent rogue DHCP severs

QUESTION 294

What are the two main reasons why I would receive an APIPA address of 169.254.1.1?

ANSWER

The DHCP server is experiencing resource exhuastion, or bad connectivity with the DHCP server.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials