Text Material Preview
DUMPS BASE EXAM DUMPS CISCO 100-160 28% OFF Automatically For You Cisco Certified Support Technician (CCST) Cybersecurity 1 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m 1.What is a common security threat in which an attacker attempts to overwhelm a targeted system by flooding it with Internet traffic? A. Ransomware B. Distributed Denial of Service (DDoS) attack C. Phishing D. SQL injection Answer: B Explanation: Option 1: Ransomware is a type of malicious software that encrypts a victim's files and demands a ransom in exchange for the decryption key. While it can cause damage to systems, it is not specifically designed to overwhelm a system with Internet traffic. Option 2: Correct. A Distributed Denial of Service (DDoS) attack is a common security threat in which an attacker attempts to overwhelm a targeted system by flooding it with Internet traffic. This can result in a loss of service availability for legitimate users. Option 3: Phishing is a type of social engineering attack in which an attacker masquerades as a trustworthy entity to trick individuals into providing sensitive information. It does not involve overwhelming a system with Internet traffic. Option 4: SQL injection is a type of web application attack in which an attacker manipulates a SQL query to gain unauthorized access to a database. It does not involve overwhelming a system with Internet traffic. 2.Which of the following statements about multi-factor authentication (MFA) is correct? A. MFA is a security measure that requires users to provide two or more forms of identification to gain access to a system or application. B. MFA is a security measure that requires users to provide only one form of identification to gain access to a system or application C. MFA is a security measure that is no longer recommended due to its complexity and potential for user errors. D. MFA is a security measure that only applies to physical access control systems. Answer: A Explanation: Option 1: This is the correct statement. MFThis is a security measure that requires users to provide two or more forms of identification to gain access to a system or application. It adds an extra layer of security by combining multiple credentials, such as passwords, one-time passcodes, biometrics, or smart cards, to verify a user's identity. Option 2: This statement is incorrect. MFA requires users to provide two or more forms of identification, not just one. Option 3: This statement is incorrect. MFThis is still recommended as an effective security measure and is widely used in many industries. 2 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Option 4: This statement is incorrect. MFA can be used for both physical and logical access control systems. 3.Which of the following services or protocols can be used to ensure the security and compliance of an organization's network? A. NTP (Network Time Protocol) B. SNMP (Simple Network Management Protocol) C. DHCP (Dynamic Host Configuration Protocol) D. DNS (Domain Name System) Answer: B Explanation: Option 1: NTP is a protocol used to synchronize the clocks of computers in a network. While it is important for maintaining accurate time, it does not directly contribute to network security and compliance. This makes it an incorrect answer. Option 2: SNMP is a protocol used for managing and monitoring network devices. It allows for centralized monitoring, troubleshooting, and configuration of devices. SNMP can play a crucial role in security and compliance by providing real-time information about network devices and their behaviors. This makes it a correct answer. Option 3: DHCP is a protocol used to assign IP addresses and network configuration parameters to devices on a network. While DHCP is essential for network connectivity, it does not directly contribute to security and compliance. This makes it an incorrect answer. Option 4: DNS is a protocol used to translate domain names into IP addresses. While DNS is critical for internet connectivity, it does not directly contribute to security and compliance. This makes it an incorrect answer. 4.Which network security feature helps protect against unauthorized data access and ensures confidentiality of sensitive information? A. Firewall B. VPN C. Intrusion Detection System D. Antivirus Answer: B Explanation: Option 1: Incorrect. A firewall is responsible for controlling incoming and outgoing network traffic based on predetermined security rules. While it can help protect against unauthorized access, it does not specifically ensure confidentiality of sensitive information. Option 2: Correct. A VPN (Virtual Private Network) creates a secure, encrypted connection between a user's device and a private network, such as a corporate 3 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m network, over the internet. This helps protect against unauthorized data access and ensures the confidentiality of sensitive information. Option 3: Incorrect. An Intrusion Detection System (IDS) monitors network traffic for suspicious activity or known attack patterns. While it can help detect and alert to potential unauthorized access attempts, it does not specifically ensure confidentiality of sensitive information. Option 4: Incorrect. An antivirus software is used to detect, prevent, and remove malware infections. While it can help protect against unauthorized access, it does not specifically ensure confidentiality of sensitive information. 5.What is a key principle of securing data in the cloud? A. Implementing strong physical security measures B. Encrypting data at rest and in transit C. Using complex passwords for all cloud users D. Limiting access to the cloud from specific IP addresses Answer: B Explanation: Option 1: Incorrect. Implementing strong physical security measures is important, but it is not the key principle of securing data in the cloud. Option 2: Correct. Encrypting data at rest and in transit is a key principle of securing data in the cloud. This ensures that even if the data is compromised, it cannot be accessed without the decryption key. Option 3: Incorrect. Using complex passwords is a good security practice, but it is not the key principle of securing data in the cloud. Option 4: Incorrect. Limiting access to the cloud from specific IP addresses is a security measure, but it is not the key principle of securing data in the cloud. 6.What is the purpose of a firewall in a network security system? A. To prevent unauthorized access to or from private networks B. To scan and filter network traffic for potential threats C. To encrypt data transmitted over the network D. To provide secure remote access to the network Answer: A Explanation: Option 1: Correct. A firewall is designed to prevent unauthorized access to or from private networks by monitoring and controlling network traffic based on predetermined security rules. Option 2: Incorrect. While a firewall can scan and filter network traffic for potential threats, this is not its primary purpose. Option 3: Incorrect. While encryption may be a feature of some firewalls, it is not the primary purpose of a firewall in a network security system. 4 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Option 4: Incorrect. While a secure remote access solution may include a firewall, this is not the primary purpose of a firewall in a network security system. 7.Which of the following is true regarding the incident response process? A. It is a reactive process that is only initiated after an incident has occurred. B. It is a proactive process that focuses on preventing incidents from occurring.It employs encryption to protect data exchanged between the client and the server, ensuring the confidentiality and integrity of the communication. SSH is commonly used for remote administration and secure file transfers. 85.What is the purpose of using an application firewall in a cybersecurity setup? A. To encrypt network traffic between applications B. To perform vulnerability scanning of applications C. To increase the speed and performance of applications D. To block malicious incoming requests and attacks aimed at the application Answer: D Explanation: An application firewall, also known as a web application firewall (WAF) or application- level firewall, is designed to protect web applications from various attacks, such as cross-site scripting (XSS), SQL injection, and distributed denial-of-service (DDoS) attacks. It analyzes the incoming traffic and blocks malicious requests, protecting the application and its underlying infrastructure. Encryption, speed enhancement, and vulnerability scanning are not primary functions of an application firewall. 86.Which of the following network technologies is commonly used to connect devices within a local area network (LAN)? A. Wi-Fi B. Ethernet C. DSL D. VPN Answer: B Explanation: Ethernet is a widely used network technology for connecting devices within a local area network (LAN). It provides a physical and data link layer protocol for wired connections, allowing devices to communicate over a LAN using Ethernet cables. Ethernet has various speeds and standards, including Ethernet over twisted pair (such as Cat 5e or Cat 6 cables), fiber optic cables, and other mediums. 35 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m 87.Which of the following is a key advantage of multifactor authentication? A. It allows for anonymous access to systems and resources. B. It simplifies the authentication process. C. It eliminates the need for strong passwords. D. It provides enhanced security by requiring multiple proofs of identity. Answer: D Explanation: Multifactor authentication enhances security by requiring users to present multiple proofs of identity. By combining different factors, such as something you know, something you have, or something you are, it becomes more difficult for unauthorized individuals to gain access. This approach adds an extra layer of protection compared to relying solely on a username and password combination. 88.What is the primary characteristic of an Advanced Persistent Threat (APT) compared to traditional attacks? A. APTs are easily detectable by conventional security measures B. APTs involve persistent and prolonged attacks on specific targets C. APTs are random and indiscriminate in their targets D. APTs are primarily aimed at causing immediate damage to systems Answer: B Explanation: The primary characteristic of an APT is its persistent and prolonged nature. Unlike traditional attacks, which may be brief and target multiple entities, APTs specifically focus on a particular target for an extended period of time. This allows the attackers to gather more information and potentially cause significant damage. 89.What is smishing? A. A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information. B. A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person. C. A type of phishing attack that targets specific individuals or organizations. D. A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive information. Answer: A Explanation: Smishing, short for SMS phishing, is a social engineering attack that utilizes SMS or text messages to deceive individuals into disclosing sensitive information or performing certain actions. These messages often mimic legitimate sources, such as 36 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m banks or service providers, and typically contain links or phone numbers that, when accessed or called, lead to malicious activities. Smishing takes advantage of the ubiquity of mobile devices and users' tendency to trust text messages. 90.Which of the following represents a strong passphrase for securing a wireless SoHo network? A. 12345678 B. P@ssword! C. CorrectHorseBatteryStaple D. jumpr0pe Answer: C Explanation: A strong passphrase should be long, include a combination of uppercase and lowercase letters, numbers, and special characters. "CorrectHorseBatteryStaple" represents a strong passphrase as it is long and includes multiple words combined with special characters. Options A, B, and D are weak passphrases as they are either too short or do not contain a combination of the mentioned elements. 91.Which of the following best describes social engineering? A. A method of manipulating individuals to disclose sensitive information B. A type of malware attack C. A physical security control D. A network security protocol Answer: A Explanation: Social engineering refers to the practice of manipulating and deceiving individuals into revealing sensitive information or performing certain actions that may compromise security. It involves exploiting human psychology and trust to gain unauthorized access to systems or obtain confidential information. Social engineering tactics can include phishing emails, impersonation, pretexting, or other forms of manipulation to trick individuals into divulging passwords, account numbers, or other confidential data. 92.Which of the following is an integral part of the CIA triad in cybersecurity? A. Data loss prevention (DLP) B. Two-factor authentication (2FA) C. Intrusion Detection System (IDS) D. Firewall Answer: B Explanation: The CIA triad in cybersecurity stands for confidentiality, integrity, and availability. Two- 37 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m factor authentication (2FA) ensures confidentiality by adding an extra layer of security, requiring users to provide two forms of authentication before gaining access. It helps protect against unauthorized access and adds an additional level of assurance for ensuring data confidentiality. 38 / 39 GET FULL VERSION OF 100-160 DUMPS Powered by TCPDF (www.tcpdf.org) 39 / 39 https://www.dumpsbase.com/100-160.html http://www.tcpdf.orgC. It is an iterative process that involves continuous improvement based on lessons learned. D. It is a one-time process that is only performed when an organization first establishes its security program. Answer: C Explanation: Option 1: Incorrect. The incident response process can be both proactive and reactive. While it does involve reacting to incidents that have already occurred, it also includes proactive measures to prevent incidents from happening again in the future. Option 2: Incorrect. While incident response can involve proactive measures to prevent incidents, it is not solely focused on prevention. It also includes reacting to incidents that have already occurred. Option 3: Correct. The incident response process is an iterative process that involves continuous improvement based on lessons learned. Organizations should regularly review and update their incident response plans to ensure they are effective and up to date. Option 4: Incorrect. The incident response process is not a one-time process. It should be an ongoing and continuous process to address security incidents as they occur and to improve the incident response capabilities of the organization. 8.Which of the following is true about security policies and procedures? A. They should be regularly reviewed and updated to reflect changing threats and technologies B. They should only be accessible to the IT department. C. They should be documented once and never changed. D. They should be kept confidential and not shared with employees. Answer: A Explanation: Option 1: Correct: Security policies and procedures should be regularly reviewed and updated to ensure they align with changing threats and technologies. This helps to maintain the effectiveness of the policies and processes. Option 2: Incorrect: Security policies and procedures should be accessible to relevant employees and stakeholders, not restricted only to the IT department. It is important for everyone to understand and adhere to the policies and procedures. 5 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Option 3: Incorrect: Security policies and procedures should be regularly updated as needed, not documented once and never changed. The changing threat landscape and evolving technologies necessitate the periodic review and update of security policies and procedures. Option 4: Incorrect: Security policies and procedures should be communicated and shared with employees to ensure everyone understands and follows them. Keeping them confidential and not sharing them would hinder their effectiveness. 9.Which of the following is a key requirement for conducting a security compliance audit? A. A comprehensive understanding of security compliance standards and regulations B. A certified auditor with expertise in security compliance C. Compliance monitoring tools and systems D. A detailed audit plan and checklist Answer: A Explanation: Option 1: Correct. A certified auditor with expertise in security compliance is a key requirement for conducting a security compliance audit. The auditor should have a deep understanding of security compliance standards and regulations to ensure that the audit is performed effectively. Option 2: Incorrect. While having a comprehensive understanding of security compliance standards and regulations is important, it is not a key requirement for conducting a security compliance audit. The main requirement is a certified auditor with expertise in security compliance. Option 3: Incorrect. Compliance monitoring tools and systems can be helpful during a security compliance audit, but they are not a key requirement. The main requirement is a certified auditor with expertise in security compliance. Option 4: Incorrect. While having a detailed audit plan and checklist is important, it is not a key requirement for conducting a security compliance audit. The main requirement is a certified auditor with expertise in security compliance. 10.Which of the following is a characteristic of a network-based firewall? A. Inspects and filters traffic at the application layer B. Operates at the data link layer C. Provides protection against external threats only D. Requires software installed on client devices Answer: C Explanation: Option 1: Incorrect. A network-based firewall inspects and filters traffic at the network 6 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m layer, not the application layer. Option 2: Incorrect. A network-based firewall operates at the network layer, not the data link layer. Option 3: Correct. A network-based firewall provides protection against both external and internal threats. Option 4: Incorrect. A network-based firewall does not require software installed on client devices. 11.Which of the following is the most secure and recommended method for storing sensitive user data in a database? A. Storing the data in plain text B. Using symmetric encryption C. Using hashing algorithms D. Using asymmetric encryption Answer: C Explanation: Option 1: Incorrect. Storing sensitive user data in plain text is highly insecure and not recommended. If a database breach occurs, all the data will be exposed without any protection. Option 2: Incorrect. Using symmetric encryption would require storing the encryption key securely, which can be difficult. Additionally, any access to the data would require the encryption key, adding complexity and potential vulnerabilities. Option 3: Correct. Using hashing algorithms is the most secure and recommended method for storing sensitive user data in a database. Hashing algorithms convert the data into a fixed-size string, making it difficult to reverse-engineer and obtain the original data. This ensures that even if a breach occurs, the sensitive data remains protected. Option 4: Incorrect. Using asymmetric encryption would also require storing the encryption keys securely and adds unnecessary complexity for data retrieval, making it less practical for storing sensitive user data in a database. 12.What is the purpose of Security Information and Event Management (SIEM) systems? A. To analyze network traffic and detect potential security threats. B. To centrally collect, store, and analyze logs from various systems to detect and respond to security incidents. C. To encrypt sensitive data to protect it from unauthorized access. D. To authenticate and authorize users to access network resources. Answer: B Explanation: Option 1: This option is incorrect. While SIEM systems may perform analysis of 7 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m network traffic, their primary purpose is not network traffic analysis, but rather log collection and analysis for security incident detection and response. Option 2: This option is correct. SIEM systems are designed to centrally collect, store, and analyze logs from various systems to detect and respond to security incidents. They provide real-time monitoring, correlation, and analysis of security events, allowing organizations to identify potential threats and take appropriate actions. Option 3: This option is incorrect. Encryption of sensitive data is not the purpose of SIEM systems. While encryption is an important security measure, SIEM systems focus on log management and analysis rather than encryption. Option 4: This option is incorrect. User authentication and authorization are not within the scope of SIEM systems. SIEM systems focus on log collection and analysis for security incident detection and response, rather than user access control. 13.Which of the following is a security best practice for securing data in the cloud? A. Storing sensitive data in clear text B. Implementing multi-factor authentication C. Allowing unrestricted accessto data D. Using weak passwords Answer: B Explanation: Option 1: Incorrect. Storing sensitive data in clear text is not a security best practice. It leaves the data vulnerable to unauthorized access and breaches. Option 2: Correct. Implementing multi-factor authentication is a security best practice for securing data in the cloud. This adds an extra layer of protection by requiring users to provide additional verification beyond just a password. Option 3: Incorrect. Allowing unrestricted access to data is not a security best practice. Access to data should be properly controlled and limited to authorized individuals or groups. Option 4: Incorrect. Using weak passwords is not a security best practice. Strong and complex passwords should be used to prevent unauthorized access to data. 14.Which of the following is a principle of data security? A. Encryption B. Firewall C. Intrusion Detection System D. Data Masking Answer: A Explanation: Option 1: Correct. Encryption is a principle of data security that involves converting data into a form that is unreadable by unauthorized users. This helps protect the confidentiality of data. 8 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Option 2: Incorrect. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. While it plays a role in data security, it is not a principle of data security. Option 3: Incorrect. An Intrusion Detection System (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports. While it plays a role in data security, it is not a principle of data security. Option 4: Incorrect. Data masking is a technique that replaces sensitive data with fictitious data to protect the privacy of data. While it plays a role in data security, it is not a principle of data security. 15.Which of the following features of the Cisco Identity Services Engine (ISE) allows network administrators to define policies for controlling access to network resources based on user identities and user or group attributes? A. Network Access Profiles B. Identity Firewall C. Profiling D. TrustSec Answer: C Explanation: Option 1: Network Access Profiles: Network Access Profiles in Cisco ISE define the behavior of network devices when they are accessed by authenticated users. They are a set of policies that determine how network resources are allocated to users or user groups, and what level of access they have. Option 2: Identity Firewall: Cisco ISE's Identity Firewall feature enables network administrators to apply firewall policies based on user identities. It allows for granular control over network access and can enforce allow, deny, or redirect actions based on user attributes. Option 3: Profiling: This is the correct answer. Cisco ISE's Profiling feature is used to dynamically classify endpoints connecting to the network based on their characteristics, such as their MAC addresses, IP addresses, and DHCP options. This information is then used to enforce access policies. Option 4: TrustSe TrustSec is a Cisco security solution that provides secure access control across the network infrastructure. While TrustSec is related to identity and access management, it is not a feature of Cisco ISE specifically. 16.What is the purpose of multi-factor authentication? A. To provide multiple layers of security by requiring users to provide more than one form of identification B. To simplify the login process by only requiring one form of identification C. To restrict access to certain users by requiring additional authorization 9 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m D. To prevent unauthorized access by encrypting user credentials Answer: A Explanation: Option 1: Correct. Multi-factor authentication adds an extra layer of security by requiring users to provide more than one form of identification, such as a password and a fingerprint or a security token. Option 2: Incorrect. Multi-factor authentication does not simplify the login process, but rather adds an additional step to verify the user's identity. Option 3: Incorrect. While multi-factor authentication can help restrict access to certain users, its main purpose is to provide an extra layer of security rather than additional authorization. Option 4: Incorrect. While encryption is an important security measure, multi-factor authentication is specifically designed to provide multiple layers of security by requiring multiple forms of identification. 17.What is a common vulnerability in cloud-based systems? A. Inadequate access controls B. Outdated antivirus software C. Weak passwords D. Lack of network segmentation Answer: A Explanation: Option 1: Correct: Inadequate access controls can leave cloud-based systems vulnerable to unauthorized access and data breaches. Option 2: Incorrect: Outdated antivirus software is a concern for individual devices but not specific to cloud-based systems. Option 3: Incorrect: Weak passwords can be a vulnerability but not a common one in cloud-based systems, which usually have password policies in place. Option 4: Incorrect: Lack of network segmentation can be a vulnerability, but it is not as common as inadequate access controls. 18.Which of the following is a best practice for managing security policies and procedures? A. Implementing a regular review process for security policies B. Relying solely on default security settings C. Allowing users to create and manage their own security policies D. Not documenting the security policies and procedures Answer: A Explanation: Option 1: Correct: Implementing a regular review process for security policies ensures 10 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m that they are up-to-date and aligned with the organization's current security needs. Option 2: Incorrect: Relying solely on default security settings is not a best practice as default settings may not provide adequate protection and may not be appropriate for the organization's specific needs. Option 3: Incorrect: Allowing users to create and manage their own security policies can lead to inconsistencies, lack of control, and potential security vulnerabilities. Option 4: Incorrect: Not documenting the security policies and procedures makes it difficult to enforce and communicate these policies to employees. 19.Which of the following is a best practice for implementing strong password policies within an organization? A. Allowing users to choose their own passwords, regardless of complexity B. Requiring users to change their password every 90 days C. Storing passwords in clear text in a central database D. Allowing users to reuse their previous passwords Answer: B Explanation: Option 1: Incorrect. Allowing users to choose their own passwords, regardless of complexity, can lead to weak passwords that are easily guessed or cracked. Option 2: Correct. Requiring users to change their password every 90 days helps to ensure that passwords are regularly updated and less likely to be compromised. Option 3: Incorrect. Storing passwords in clear text in a central database is a security risk as it exposes the passwords to potential unauthorized access. Option 4: Incorrect. Allowing users to reuse their previous passwords increases the risk of unauthorized access as attackers may already be aware of the user's previous passwords. 20.What is the primary reason for implementing multi-factor authentication in a cloud environment? A. To provide an additional layer of security B. To simplify the authentication process C. To reduce costs D. To improve performance Answer: A Explanation: Option 1: Correct.Implementing multi-factor authentication provides an additional layer of security by requiring users to provide multiple forms of authentication to access cloud resources. Option 2: Incorrect. The primary reason for implementing multi-factor authentication is to provide an additional layer of security, not to simplify the authentication process. 11 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Option 3: Incorrect. The primary reason for implementing multi-factor authentication is to provide an additional layer of security, not to reduce costs. Option 4: Incorrect. The primary reason for implementing multi-factor authentication is to provide an additional layer of security, not to improve performance. 21.Which security feature provides network segmentation by creating virtual networks? A. VLANs B. VLANs C. Intrusion Prevention System (IPS) D. Virtual Private Network (VPN) Answer: A Explanation: Option 1: Correct, VLANs (Virtual Local Area Networks) provide network segmentation by creating virtual networks, allowing different groups of devices to be logically separated on the same physical network. Option 2: Incorrect, Firewalls are designed to monitor and filter network traffic based on predetermined security rules, but they do not provide network segmentation by creating virtual networks. Option 3: Incorrect, An Intrusion Prevention System (IPS) is a security appliance or software that monitors network traffic for suspicious activity and takes action to prevent potential threats, but it does not provide network segmentation by creating virtual networks. Option 4: Incorrect, A Virtual Private Network (VPN) is a secure tunnel between two or more devices, typically used to connect remote sites or allow remote users to access the private network. It does not provide network segmentation by creating virtual networks. 22.Which of the following is a network security device that operates at the session layer of the OSI model? A. Firewall B. Intrusion Detection System (IDS) C. Intrusion Prevention System (IPS) D. SSL/TLS Answer: B Explanation: Option 1: Incorrect. A firewall operates at the network layer (layer of the OSI model, not the session layer (layer 5). Option 2: Correct. An Intrusion Prevention System (IPS) operates at the session layer (layer 5) of the OSI model. It monitors network traffic in real-time and can block or prevent malicious activities. 12 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Option 3: Incorrect. An Intrusion Detection System (IDS) operates at the network layer (layer of the OSI model, not the session layer (layer 5). Option 4: Incorrect. SSL/TLS is a cryptographic protocol that operates at the transport layer (layer of the OSI model, not the session layer (layer 5). 23.Which of the following is a feature of cloud computing? A. On-premises hosting B. Hardware provisioning C. Data encryption D. Physical server maintenance Answer: C Explanation: Option 1: Incorrect. On-premises hosting refers to hosting applications and data on local servers within an organization's physical infrastructure. It is not a feature of cloud computing. Option 2: Incorrect. Hardware provisioning is the process of setting up and configuring the physical infrastructure required to run applications and store data. While this is an important aspect of cloud computing, it is not a specific feature of cloud computing. Option 3: Correct. Data encryption is a feature of cloud computing that ensures the security and confidentiality of data stored and transmitted within the cloud. It protects sensitive information from unauthorized access. Option 4: Incorrect. Physical server maintenance involves activities such as hardware repairs, upgrades, and maintenance tasks associated with physical servers. While these tasks are necessary for managing an on-premises infrastructure, they are not specific features of cloud computing. 24.Which security technology uses an agent-based approach to protect endpoints and is designed to detect and prevent malicious activities? A. Firewall B. Intrusion Prevention System (IPS) C. Data Loss Prevention (DLP) D. Advanced Malware Protection (AMP) Answer: D Explanation: Option 1: Incorrect. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Option 2: Incorrect. An Intrusion Prevention System (IPS) is a network security device that monitors network traffic and is designed to detect and prevent unauthorized access and malicious activities. Option 3: Incorrect. Data Loss Prevention (DLP) is a security technology that prevents sensitive data from being lost, stolen, or inadvertently leaked. 13 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Option 4: Correct. Advanced Malware Protection (AMP) uses an agent-based approach to protect endpoints and detect and prevent known and unknown malicious activities. It includes features such as file reputation analysis, sandboxing, and behavior-based malware detection. 25.Which of the following is true regarding secure web gateways (SWG)? A. SWGs provide protection against malware and advanced threats B. SWGs are primarily used to secure internal web applications. C. SWGs are no longer necessary with the advent of cloud-based applications. D. SWGs can only be deployed on-premises Answer: A Explanation: Option 1: Correct. Secure web gateways (SWG) provide protection against malware and advanced threats. They act as an intermediary between users and the internet, inspecting web traffic to detect and block malicious content and prevent data loss. Option 2: Incorrect. While secure web gateways (SWG) can be used to secure internal web applications, their primary function is to provide protection against malware and advanced threats. Option 3: Incorrect. Secure web gateways (SWG) are still necessary, even with the advent of cloud-based applications. They provide additional security controls and visibility for web traffic, regardless of whether the applications are on-premises or in the cloud. Option 4: Incorrect. Secure web gateways (SWG) can be deployed both on-premises and in the cloud, depending on the organization's needs and preferences. 26.Which feature allows endpoints to communicate directly with each other, bypassing the network? A. Firewall B. IPS C. VPN D. Peer-to-Peer Answer: D Explanation: Option 1: Incorrect. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Option 2: Incorrect. An IPS (Intrusion Prevention System) is a network security device that monitors network traffic for malicious activity and takes immediate action to prevent attacks. Option 3: Incorrect. A VPN (Virtual Private Network) is a secure connection between two or more endpoints over a public network, providing encryption and privacy for data communication. 14 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Option 4: Correct. Peer-to-peer (P2P) is a decentralized communication model where endpoints can directly communicate with each other without the need for a central server or network infrastructure. 27.Which of the following is a data protection technique that involves the transformation of data into a format that is unreadable to unauthorized users? A. Authentication B. Encryption C. Firewall D. Intrusion Detection System Answer: B Explanation: Option 1: Incorrect. Authentication refers to the process of verifying the identity of a user or system. Option 2: Correct. Encryption is a data protection technique that transforms data into a format thatis unreadable to unauthorized users. It provides confidentiality and ensures that even if the data is intercepted, it cannot be easily understood. Option 3: Incorrect. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. Option 4: Incorrect. An Intrusion Detection System (IDS) is a security tool that monitors network traffic for suspicious activity or violations of security policies. 28.Which of the following protocols can be used to securely transfer files over a network? A. HTTP B. FTP C. SMTP D. DNS Answer: B Explanation: Option 1: Incorrect. HTTP is a protocol for transferring hypertext documents, not files. Option 2: Correct. FTP (File Transfer Protocol) is a protocol used for secure file transfer over a network. Option 3: Incorrect. SMTP is a protocol used for sending email, not transferring files. Option 4: Incorrect. DNS is a protocol used for translating domain names to IP addresses, not transferring files. 29.Which of the following is an example of a data security principle? A. Least Privilege 15 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m B. Session Management C. ARP Spoofing D. Ciphertext Answer: A Explanation: Option 1: Correct. Least Privilege is a data security principle that limits the access rights of individuals to only what is necessary for them to perform their job functions. Option 2: Incorrect. Session Management is a security practice related to handling user sessions, but it is not specifically a data security principle. Option 3: Incorrect. ARP Spoofing is a network attack technique, not a data security principle. Option 4: Incorrect. Ciphertext refers to encrypted data, but it is not a data security principle. 30.Which of the following is a common security threat that targets web applications? A. SQL injection B. DNS poisoning C. Man-in-the-middle attack D. Distributed Denial of Service (DDoS) Answer: A Explanation: Option 1: Correct: SQL injection is a common security threat that targets web applications. It involves inserting malicious SQL code into input fields to manipulate the application's database and gain unauthorized access or retrieve sensitive information. Option 2: Incorrect: DNS poisoning is not a common security threat that targets web applications. It involves corrupting the DNS cache and redirecting users to malicious websites. Option 3: Incorrect: Man-in-the-middle attack is not a common security threat that specifically targets web applications. It involves intercepting communication between two parties and can affect various types of network communication. Option 4: Incorrect: Distributed Denial of Service (DDoS) is not a common security threat that targets web applications specifically. It involves overwhelming a target system with a flood of traffic from multiple sources, rendering it inaccessible. 31.Which network infrastructure component allows for the translation of domain names to IP addresses? A. Firewall B. Router C. DNS server D. DHCP server 16 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Answer: C Explanation: DNS (Domain Name System) is a network infrastructure component that translates domain names (e.g., www.example.com) into their corresponding IP addresses (e.g., 192.168.1.1). DNS servers maintain a distributed database that maps domain names to IP addresses, allowing users to access websites and other resources using easy-to- remember names instead of complex IP addresses. 32.What is malware? A. A form of cyber attack that attempts to gain unauthorized access to a network. B. A software program that is designed to damage, disrupt, or gain unauthorized access to a computer system. C. A technique used by attackers to obtain sensitive information through deception. D. A network of compromised computers used to carry out coordinated attacks. Answer: B Explanation: Malware is a term used to describe any type of malicious software that is specifically designed to damage, disrupt, or gain unauthorized access to a computer system. This can include viruses, worms, trojan horses, spyware, and adware. 33.Which of the following encryption algorithms is considered strong? A. RSA B. MD5 C. ROT13 D. DES Answer: A Explanation: RSA is considered a strong encryption algorithm because it uses asymmetric encryption, which means it uses different keys for encryption and decryption. RSA is widely used in secure communication protocols and provides a high level of security. 34.Which of the following password policies is considered a best practice? A. Requiring passwords to be changed every 5 years B. Allowing users to set easily guessable passwords C. Enforcing a minimum password length and complexity requirements D. Storing passwords in plain text format Answer: C Explanation: Enforcing a minimum password length and complexity requirements is considered a best practice for password policies. This helps to ensure that passwords are not 17 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m easily guessable and increases the security of user accounts. 35.What does hardening mean in the context of cybersecurity? A. Removing all vulnerabilities from a system or network B. Implementing cybersecurity policies and regulations C. Creating a backup of critical data and configurations D. Making a system more resistant to threats and attacks Answer: D Explanation: Hardening refers to the process of securing a system by reducing its vulnerability to potential threats and attacks. It involves implementing security best practices, such as disabling unnecessary services, applying patches and updates, configuring access controls, strengthening passwords, and employing additional security measures like firewalls or intrusion detection systems. Hardening helps ensure systems are less susceptible to exploitation. 36.Which encryption method is used to secure data while it is being actively used and processed by an application? A. Asymmetric encryption B. Homomorphic encryption C. Secure Sockets Layer (SSL) D. Hash encryption Answer: B Explanation: Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without decrypting it. This method enables the secure processing and manipulation of data while it is in use by an application or system. Homomorphic encryption is particularly useful in scenarios where privacy is a concern, such as in cloud computing or data analytics. 37.What type of encryption is used to secure data that is stored on a hard drive or other storage media? A. File-based encryption B. Hash encryption C. Symmetric encryption D. Public Key Infrastructure (PKI) Answer: C Explanation: Symmetric encryption is a type of encryption where the same key is used for both the encryption and decryption processes. It is commonly employed to secure data at rest, 18 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m such as on a hard drive or other storage media. With symmetric encryption, the key must be kept secret to ensure the confidentiality of the encrypted data. 38.Which of the following is a characteristic of cloud-based applications in the context of cybersecurity? A. They provide enhanced flexibility and scalability for organizations. B. They are not widely used and are considered a less secure option. C. They require physical installation and maintenance, limiting their accessibility. D. They are typically more susceptible to cyber attacks compared to traditional on- premises applications. Answer: A Explanation: Cloud-based applications offer numerous benefits, one of which is enhanced flexibilityand scalability. These applications allow organizations to easily adjust their usage and storage needs without the need for physical hardware upgrades. This flexibility often contributes to improved productivity and cost-effectiveness. However, it's important to note that the cybersecurity of cloud-based applications depends on the implementation and security measures taken by the provider and user. 39.Which of the following is a characteristic of an IPv6 address? A. Uses colons as separators B. Can be represented by both decimal and binary notation C. Supports a maximum of 4.3 billion unique addresses D. Consists of 32 bits Answer: A Explanation: An IPv6 address consists of 128 bits, which is four times the size of an IPv4 address. Unlike IPv4 addresses that use periods (dots) as separators, IPv6 addresses use colons as separators. For example, an IPv6 address could be written as 2001:0db8:85a3:0000:0000:8a2e:0370:7334. 40.Which of the following represents a technique used in Classless Inter-Domain Routing (CIDR)? A. Variable-length subnet masks B. Compressed MAC addresses C. Binary notation for IP addresses D. 32-bit IP addresses Answer: A Explanation: 19 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Classless Inter-Domain Routing (CIDR) is a technique used to allocate and manage IP addresses more efficiently. It involves using variable-length subnet masks (VLSMs), which allow the network to have subnets of different sizes. VLSMs provide flexibility in allocating IP addresses by allowing the network administrator to choose the appropriate number of network and host bits based on the network requirements. 41.Which of the following describes the purpose of a VPN (Virtual Private Network)? A. To improve network performance and reduce latency B. To segment a network into multiple smaller networks C. To provide secure remote access to a private network over the internet D. To control and filter network traffic based on predefined policies Answer: C Explanation: A VPN (Virtual Private Network) is a technology that enables secure and encrypted communication over a public network, such as the internet. It allows users to establish a secure connection to a private network from remote locations. By encrypting the communication, a VPN ensures confidentiality and integrity of the data transmitted between the remote user and the private network, making it a suitable solution for secure remote access. 42.What is the main difference between a public and a private network? A. Public networks are secured, while private networks are not B. Private networks are more expensive to set up than public networks C. Public networks use public IP addresses, while private networks use private IP addresses D. Private networks are accessible to the general public, while public networks are not Answer: C Explanation: The main difference between a public network and a private network lies in the IP addressing scheme. Public networks use public IP addresses, provided by ISPs, to route traffic over the internet. Private networks, on the other hand, use private IP addresses, typically reserved IP ranges (e.g., 192.168.x.x or 10.x.x.x), for local communication within a network. 43.What is one of the ethical principles that guide the code of ethics for cybersecurity professionals? A. Impersonation B. Confidentiality C. Anonymity D. Discrimination 20 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Answer: B Explanation: Confidentiality is one of the key ethical principles for cybersecurity professionals. It requires professionals to respect the privacy of individuals and organizations by keeping sensitive information secure and not disclosing it without proper authorization. This helps build trust and ensures the protection of confidential data. 44.Which of the following best describes network security? A. Ensuring high availability and performance of the network B. Securing physical access to network devices C. Protecting data from unauthorized access or modifications D. Preventing network configuration errors Answer: C Explanation: Network security is the practice of protecting data in a network from unauthorized access, modifications, or attacks. It involves implementing various security measures such as access control, encryption, firewalls, and intrusion prevention systems. 45.Which of the following is a characteristic of weak encryption algorithms? A. They support secure communication protocols. B. They are susceptible to cryptanalysis attacks. C. They are resistant to brute force attacks. D. They provide encryption keys with longer bit lengths. Answer: B Explanation: Weak encryption algorithms are those that can be easily broken or exploited using various encryption analysis techniques. These algorithms have vulnerabilities that can be used to decrypt the encrypted data without the need for the encryption key. 46.What is the primary purpose of a VPN (Virtual Private Network)? A. To encrypt email communications B. To secure wireless network connections C. To establish a secure remote connection over a public network D. To protect against malware attacks Answer: C Explanation: A VPN is designed to provide secure, encrypted communication over a public network such as the internet. Its primary purpose is to establish a secure and private connection between two endpoints, allowing remote users to access resources on a 21 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m private network as if they were directly connected to it. This helps protect sensitive data and communications from interception by unauthorized individuals. 47.Which of the following involves dividing a network into smaller, more manageable segments? A. DHCP configuration B. IP addressing C. VLAN configuration D. Subnetting Answer: D Explanation: Subnetting is the process of dividing a network into smaller subnetworks, called subnets or subnetworks. It helps in improving network performance, optimizing address allocation, and enhancing network security. Subnetting is typically done by using a subnet mask to determine the network and host portions of an IP address. 48.Which of the following is a unique identifier assigned to a network interface card (NIC)? A. IP address B. Default gateway C. MAC address D. Subnet mask Answer: C Explanation: A Media Access Control (MAC) address is a unique identifier assigned to a network interface card (NIC) by the manufacturer. It is a 48-bit address typically represented as six groups of two hexadecimal digits separated by colons or hyphens. MAC addresses are used for communication at the data link layer of the network stack. 49.Which protocol is used for communication between web browsers and web servers? A. ICMP B. TCP C. UDP D. HTTP Answer: D Explanation: HTTP (Hypertext Transfer Protocol) is the protocol used for communication between web browsers (client) and web servers. It allows for the exchange of hypertext, which includes text, images, and other resources, over the Internet. HTTP operates on top 22 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m of TCP, ensuring reliable delivery of data. 50.What is spear phishing? A. A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person. B. A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information. C. A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive information. D. A type of phishing attack that targets specific individuals or organizations. Answer: D Explanation:Spear phishing is a targeted form of phishing attack that focuses on specific individuals or organizations. In spear phishing, the attacker gathers information about the target and tailors the phishing emails or messages to make them seem more legitimate and convincing. The goal is to trick the target into revealing sensitive information, such as login credentials or financial details. 51.What is the purpose of encryption in network security? A. To monitor and detect network attacks B. To authenticate and authorize users C. To protect the confidentiality and integrity of data during transmission D. To prevent unauthorized physical access to network devices Answer: C Explanation: Encryption is the process of transforming data into an unintelligible form (ciphertext) to protect its confidentiality and integrity during transmission. It ensures that even if the data is intercepted, it cannot be understood or modified without the encryption key. Encryption helps in safeguarding sensitive information from unauthorized access and tampering. 52.Which cryptographic technique is used to ensure the integrity of data without the ability to reverse the process? A. Hashing algorithm B. Digital signature C. Asymmetric encryption D. Symmetric encryption Answer: A Explanation: Hashing is a cryptographic technique where an input (data/message) is processed 23 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m through an algorithm to produce a fixed-size output, known as a hash value. The key characteristic of hashing is that it is a one-way function, meaning that it is computationally infeasible to reverse the process and derive the original input from the hash value. Hashing is commonly used to verify data integrity, as even a small change in the input will result in a significantly different hash value. 53.What type of security technique involves setting up a decoy system or network to lure and trap potential attackers? A. Honeypot B. Virtualization C. DMZ D. Proxy Answer: A Explanation: A honeypot is a security technique that involves setting up a decoy system or network to attract potential attackers. The purpose of a honeypot is to gather information about attackers' tactics, techniques, and intentions, allowing organizations to learn more about the threats they face and improve their defenses. By monitoring the activities within a honeypot, organizations can gain valuable insights into emerging attack methods and enhance their overall cybersecurity strategy. 54.Which of the following is an example of a web application vulnerability that can be exploited by an attacker? A. Network latency B. Disk fragmentation C. Buffer overflow D. Cross-site scripting (XSS) Answer: D Explanation: Cross-site scripting (XSS) is a web application vulnerability where an attacker injects malicious code into a trusted website, which then executes on the victim's browser. This vulnerability can allow attackers to steal sensitive information, perform phishing attacks, or deliver malware. Disk fragmentation, network latency, and buffer overflow are not examples of web application vulnerabilities; they refer to other aspects of computing performance and security. 55.What is encryption? A. A process of converting plaintext into binary code to enhance data accessibility B. A process of converting binary code into plaintext to improve data reliability 24 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m C. A process of converting plaintext into ciphertext to protect data confidentiality D. A process of converting ciphertext into plaintext to secure data integrity Answer: C Explanation: Encryption is the process of converting plaintext (original data) into a coded or unreadable format known as ciphertext. This ensures that if the data is intercepted or accessed by unauthorized individuals, they would not be able to understand the information without the appropriate decryption key. Encryption is used to protect the confidentiality and privacy of sensitive data during transmission or storage. 56.Which of the following is NOT a component of AAA? A. Authorization B. Accountability C. Authentication D. Accurate accounting Answer: D Explanation: The components of AAA are Authentication, Authorization, and Accounting. Accounting refers to the process of tracking and logging user activities, but its focus is not on accuracy. Instead, accounting provides information about resource usage, user activities, and system utilization for auditing and analysis purposes. 57.What is the purpose of implementing a firewall in a network? A. To scan and remove malware from network traffic B. To prevent unauthorized physical access to network devices C. To control and filter network traffic based on predetermined security policies D. To monitor network performance and troubleshoot issues Answer: C Explanation: A firewall is a network security device that acts as a barrier between internal and external networks. Its main purpose is to control and filter network traffic based on predetermined security policies. It examines packets entering or leaving the network and either allows or blocks them based on the configured rules. 58.Which statement accurately describes the concept of a code of ethics in the cybersecurity field? A. A document that articulates ethical standards for cybersecurity professionals. B. A set of laws and regulations governing cybersecurity practices. C. A framework outlining the steps of a cybersecurity attack. D. A compilation of open-source tools for network security. 25 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m Answer: A Explanation: A code of ethics in the cybersecurity field is a document that outlines the ethical standards and behavior expected from cybersecurity professionals. It provides guidelines for professionals to follow in order to maintain integrity, protect privacy, and ensure the responsible use of technology in their work. 59.Which notation is used by IPv6? A. Decimal notation B. Octal notation C. Hexadecimal notation D. Binary notation Answer: C Explanation: IPv6 addresses are expressed using hexadecimal notation. It consists of eight groups of four hexadecimal digits separated by colons, e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334. Hexadecimal digits range from 0 to 9 and A to F. 60.What are botnets? A. An attack that manipulates individuals into revealing sensitive information or performing certain actions. B. A network of compromised computers controlled by a central entity to carry out malicious activities. C. A form of cyber attack that attempts to gain unauthorized access to a network. D. A software program that is designed to damage, disrupt, or gain unauthorized access to a computer system. Answer: B Explanation: Botnets are networks of compromised computers that are controlled by a central entity, often referred to as a botmaster. These compromised computers, also known as bots or zombies, are typically infected with malware and can be used to carry out various malicious activities, such as launching DDoS attacks, sending spam emails, or stealing sensitive information. 61.Which of the following is an example of a private IP address? A. 169.254.0.1 B. 203.0.113.0 C. 172.16.0.0 26 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m D. 198.51.100.0 Answer: C Explanation: Among the given options, 172.16.0.0 is an example of a private IP address. It falls within the range of private IP addresses defined by RFC 1918, specifically the Class B private address range 172.16.0.0 - 172.31.255.255, which is commonly used for internal networks. 62.Which of the following is a common securitycontrol measure used to protect applications from unauthorized access? A. File compression B. Biometric authentication C. Hard disk formatting D. Data anonymization Answer: B Explanation: Biometric authentication is a security control measure that uses physical or behavioral characteristics, such as fingerprint scanning or facial recognition, to verify a user's identity. By implementing biometric authentication, organizations can add an extra layer of protection to their applications and control access to sensitive data. File compression, data anonymization, and hard disk formatting are not directly related to application security measures. 63.Which of the following is a common authentication protocol used in wireless networks? A. FTP B. WPA C. SSH D. SMTP Answer: B Explanation: WPA (Wi-Fi Protected Access) is a widely used authentication protocol for securing wireless networks. It provides stronger security than the older WEP (Wired Equivalent Privacy) protocol by utilizing encryption algorithms and dynamic key generation. WPA offers better protection against unauthorized access and helps ensure the confidentiality and integrity of wireless communications. 64.Which encryption method provides the highest level of security for a wireless SoHo network? A. WPA2 27 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m B. WEP C. WPA D. TKIP Answer: A Explanation: WPA2 (Wi-Fi Protected Access 2) is currently the most secure encryption method for wireless networks. It uses the Advanced Encryption Standard (AES) algorithm, which provides a high level of protection against unauthorized access. WEP (Wired Equivalent Privacy) is an older encryption method that is considered weak and easily crackable. WPA (Wi-Fi Protected Access) is an improvement over WEP but still has some vulnerabilities. TKIP (Temporal Key Integrity Protocol) is an older encryption method used with WPA that has also been found to have security weaknesses. Therefore, the correct answer is WPA2. 65.What is a digital certificate used for in the context of cybersecurity? A. Encrypting data B. Verifying the identity of an entity C. Creating a secure tunnel D. Decrypting data Answer: B Explanation: A digital certificate is an electronic document used to prove the authenticity and identity of an entity, such as a person, organization, or device, in an online environment. It is issued and digitally signed by a trusted third party known as a certification authority (CA). Digital certificates are commonly used in cybersecurity for purposes such as authentication, ensuring secure communication, and establishing trust between entities. 66.Which of the following access control methods is the most secure? A. Biometric authentication B. Multi-factor authentication C. Single-factor authentication D. Password-based authentication Answer: A Explanation: Biometric authentication is considered the most secure access control method because it relies on unique physical or behavioral characteristics of an individual, such as fingerprints, iris scans, or voice recognition. These characteristics are difficult to replicate or forge, making it more difficult for unauthorized individuals to gain access. 28 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m 67.Which of the following is a common threat to cybersecurity? A. Software updates B. Data encryption C. User authentication D. Phishing attacks Answer: D Explanation: Phishing attacks are a common threat to cybersecurity. They involve fraudulent attempts to obtain sensitive information, such as passwords and credit card details, by disguising as a trustworthy entity in electronic communication. It is important to be cautious and verify the authenticity of any requests for personal information to protect against phishing attacks. 68.Which protocol is used to assign IP addresses to devices on a network? A. ICMP B. DHCP C. UDP D. TCP Answer: B Explanation: DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses dynamically to devices on a network. Instead of manually configuring IP addresses on each device, DHCP allows for automated IP address allocation, making network administration more efficient. 69.Which technology is responsible for managing cryptographic keys, digital certificates, and providing other security-related services? A. Intrusion Detection System (IDS) B. Virtual Private Network (VPN) C. Public Key Infrastructure (PKI) D. Firewall Answer: C Explanation: Public Key Infrastructure (PKI) is a framework of hardware, software, policies, and procedures used to manage the generation, storage, distribution, and revocation of digital certificates and encryption keys. PKI provides important security services such as authentication, encryption, and integrity checking. It enables secure communication, verifies the trustworthiness of digital identities, and ensures the confidentiality and integrity of data exchanged between parties. 29 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m 70.What is a denial of service (DoS) attack? A. A technique used by attackers to obtain sensitive information through deception. B. A software program that is designed to damage, disrupt, or gain unauthorized access to a computer system. C. A form of cyber attack that attempts to gain unauthorized access to a network. D. An attack that overwhelms a target system with a flood of traffic or requests, rendering it inaccessible to legitimate users. Answer: D Explanation: A denial of service (DoS) attack is a type of cyber attack that aims to make a target system or network unavailable to its intended users by overwhelming it with a flood of traffic or requests. This effectively denies legitimate users access to the system. 71.Which of the following features help to secure a wireless SoHo network from unauthorized access? A. Default admin credentials B. Weak encryption C. MAC filtering D. SSID broadcast Answer: C Explanation: MAC filtering is a feature that allows a network administrator to specify which devices can connect to the wireless network based on their MAC (Media Access Control) addresses. By enabling MAC filtering, only devices with authorized MAC addresses will be allowed to connect, thereby enhancing network security. SSID (Service Set Identifier) broadcast refers to the network name being broadcasted, and hiding it doesn't provide significant security improvement. Default admin credentials should always be changed to prevent unauthorized access, making option C a weak answer choice. Weak encryption, such as WEP or TKIP, provides little security and should be avoided. 72.What is the primary function of a server in a network infrastructure? A. Monitor network traffic B. Filter incoming and outgoing traffic C. Detect and prevent intrusions D. Store and manage files Answer: D Explanation: A server is a computer or system that is dedicated to serving the needs of other 30 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m computers (clients) on a network. A primary function of a server is to store and manage files, applications, and other resources that can be accessed by clients over the network. 73.Which encryption method uses a single key to both encrypt and decrypt data? A. SSL/TLS B. Symmetric encryption C. Hashing D. Asymmetric encryption Answer: B Explanation: Symmetric encryption uses a single key to both encrypt and decrypt data. This means that the same key is used by both the sender and the receiver to secure the communication. It is faster and less computationally intensive than asymmetric encryption. 74.What is an attack vector in cybersecurity? A. The method used byan attacker to gain unauthorized access B. A vulnerability in a system that can be exploited C. The path or means through which an attacker can exploit vulnerabilities D. The likelihood of a cyber attack taking place Answer: C Explanation: An attack vector refers to the pathway or means by which an attacker can carry out a successful exploit or gain unauthorized access to a system. It can be a network protocol, software vulnerability, social engineering technique, malicious email attachment, or any other method that allows an attacker to exploit vulnerabilities. Understanding attack vectors is crucial for implementing effective defenses and mitigating risks. 75.Which of the following is an example of a network vulnerability? A. Encrypting sensitive data B. Running outdated and unpatched software C. Using a strong password D. Implementing a firewall Answer: B Explanation: Running outdated and unpatched software is an example of a network vulnerability. Software updates often include patches to fix security vulnerabilities that have been discovered. Failing to install these updates or using outdated software increases the 31 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m risk of an attacker exploiting known vulnerabilities to gain unauthorized access or compromise the network. 76.Which of the following is NOT an essential security principle? A. Complexity B. Confidentiality C. Availability D. Integrity Answer: A Explanation: Complexity is not considered an essential security principle. The essential security principles are confidentiality, availability, and integrity. Confidentiality ensures that information is only accessible to authorized individuals or entities. It focuses on protecting sensitive data from unauthorized disclosure or access. Availability ensures that information and resources are accessible when needed. It emphasizes the need for systems and networks to be operational and usable, with minimal downtime or interruptions. Integrity ensures that information is accurate, complete, and unaltered. It focuses on maintaining the trustworthiness and reliability of data and preventing unauthorized modifications. Complexity, although important in certain areas of cybersecurity, is not considered an essential security principle on its own. It often relates to the design and implementation of security controls or measures, rather than being a fundamental principle. 77.Which technology is responsible for monitoring network traffic and identifying potential threats? A. IDS B. Firewall C. Server D. IPS Answer: A Explanation: An Intrusion Detection System (IDS) is a technology that monitors network traffic and analyzes it for potential security breaches or vulnerabilities. It detects and alerts administrators to any suspicious activity, allowing them to take appropriate actions to mitigate potential threats. 78.Which of the following best describes the concept of defense in depth in cybersecurity? A. Utilizing multiple layers of security controls to protect against different types of threats 32 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m B. Running regular vulnerability scans to maintain the integrity of the system C. Implementing access controls to ensure availability of critical resources D. Encrypting sensitive data to maintain confidentiality Answer: A Explanation: Defense in depth is a cybersecurity strategy that involves implementing multiple layers of security controls to protect against various types of threats. This approach provides greater resilience and mitigates potential vulnerabilities. By implementing multiple layers, even if one control fails, others can still safeguard the system. 79.What is the general motivation behind an Advanced Persistent Threat (APT)? A. Publicity B. Random disruption C. Financial gain D. Revenge Answer: C Explanation: The general motivation behind an APT is often financial gain. Threat actors conducting APTs aim to gain unauthorized access to valuable information, such as financial data or intellectual property, with the intention of extracting monetary value from their targets. 80.What is a vulnerability in the context of cybersecurity? A. An advanced encryption algorithm B. A software bug that causes system crashes C. A weakness in a system that can be exploited by threats D. A security measure that prevents unauthorized access Answer: C Explanation: A vulnerability refers to a weakness in a system that can be exploited by threats or attackers. It could be a flaw in software, a misconfiguration, or a gap in security controls that can be taken advantage of to gain unauthorized access, disrupt services, or compromise data. Identifying and addressing vulnerabilities is crucial to maintaining a secure cybersecurity posture. 81.What is an Advanced Persistent Threat (APT)? A. A vulnerability in network communication protocols. B. A cyberattack that compromises multiple devices simultaneously. C. A sophisticated and targeted attack that aims to gain unauthorized access and maintain persistence over a long period. 33 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m D. A type of malware that spreads rapidly through a network. Answer: C Explanation: Advanced Persistent Threats (APTs) are stealthy and prolonged attacks targeted at specific organizations or entities. APTs typically employ sophisticated techniques, including social engineering and zero-day exploits. The primary objectives of APTs are to gain unauthorized access, maintain persistence within the target network or system, and conduct reconnaissance or exfiltrate sensitive data without being detected for an extended period of time. 82.What is an insider threat? A. A threat posed by an individual with authorized access to an organization's systems and data. B. A vulnerability in an organization's network infrastructure. C. The accidental disclosure of sensitive information. D. A security breach caused by an external attacker. Answer: A Explanation: Insider threats refer to risks and vulnerabilities that arise from individuals who have authorized access to an organization's systems, networks, or data. These individuals may intentionally or unintentionally cause harm, such as stealing confidential information, sabotaging systems, or disclosing sensitive data to unauthorized entities. 83.What is tailgating in the context of cybersecurity? A. A type of phishing attack that targets specific individuals or organizations. B. A physical attack where an unauthorized person gains entry to a restricted area by following closely behind an authorized person. C. A form of social engineering attack that uses SMS or text messages to trick victims into revealing sensitive information. D. A cyber attack where an attacker manipulates and deceives an individual to reveal sensitive information. Answer: B Explanation: Tailgating refers to the act of an unauthorized person gaining physical access to a secured area by closely following behind an authorized person who has just been granted access. This form of physical attack exploits the weakness in human behavior, as people tend to hold doors open for others out of politeness or assume that the person following them is authorized. 34 / 39 10 0- 16 0 Dum ps (V 8. 02 ) - R el ia bl e Res ou rc es fo r P as sin g Cisc o 10 0- 16 0 Exa m 84.Which protocol uses encryption for secure remote access to network resources? A. Point-to-Point Protocol (PPP) B. Wireless Equivalent Privacy (WEP) C. Internet Protocol Security (IPSec) D. Secure Shell (SSH) Answer: D Explanation: Secure Shell (SSH) is a cryptographic network protocol that provides secure remote access and control of network resources.