Professional Documents
Culture Documents
2. Which of the following term refers to the existence of a weakness, design, or implementation error
that, when exploited, leads to an unexpected and undesired event compromising the security of
the system?
Threat
Vulnerability
Attack
Risk
Threat
Attack
Risk
Vulnerability
4. Identify the configuration vulnerability that exists due to the misconfiguration of computing and
network devices.
Lack of continuity
Configuration vulnerabilities
Technological vulnerabilities
Injection vulnerabilities
7. Which of the following types of wireless technology uses radio-frequency electromagnetic waves to
transfer data for automatic identification and tracking tags attached to objects?
Wi-Fi
Wi-Max
Bluetooth
RFID
8. Wireless networks provide which of the following?
Low delay
Disconnected operation
High bandwidth
9. Which of the following IEEE standards defines the quality of service (QoS) for wireless
applications?
802.11i
802.16
802.15
802.11e
10. Which of the following networks uses wireless infrastructure or optical-fiber connections to link
sites and covers an entire city or suburb?
11. Which of the following wireless network components connects multiple LANs at the MAC layer,
increases the wireless coverage area, and is separated either logically or physically?
Wireless bridge
Wireless repeater
Wireless modem
12. Which of the following wireless network components allows Internet-enabled devices to access the
network, combines the functions of wireless access points and routers, and provides a network
address translation feature?
Wireless repeater
Wireless bridge
Wireless modem
Wireless gateway
13. Which of the following types of antennas is used by radio stations for effective radio signal
transmission?
Yagi antenna
Reflector antenna
Omnidirectional antenna
14. Which of the following types of antennas can achieve very-long-distance Wi-Fi transmissions by
utilizing the principle of a highly focused radio beam?
Yagi antenna
Reflector antenna
Dipole antenna
15. In which type of wireless topology, devices exchange information with each other as in peer-to-
peer communication, without the need of an access point for communication?
16. Which of the following points is true about shared-key authentication in wireless networks?
17. Which of the following is an access point (AP) deployment guideline that should be followed by
organizations to improve performance and prevent misuse?
19. Which of the following can help in finding abnormalities in a wireless network, such as policy
violations, unencrypted traffic, rouge wireless APs, and unauthorized network activity?
Wireless IDS/IPS
20. Which among the following helps minimize wireless attacks and improves performance and
security?
21. Which of the following is a virtualization-based security feature that separates business data and
the underlying process?
IPAM
SMB
IUM
NFV
22. Which of the following features of a virtual box can be used by a network defender to prevent a
guest from inserting anything suspicious in the page tables and thereby secure the virtual box?
Enabling hyperthreading
23. Which of the following avoids the accidental connection of switch ports with PortFast enabled and
prevents Layer 2 loops or topology changes?
Root Guard
BPDU Filter
BPDU Guard
24. Which option for the deployment of NIDS sensors is ideal for securing a perimeter network and
identifying attacks that bypass the external firewall?
Location 3
Location 1
Location 4
Location 2