Final Endpoint
Final Endpoint
Which two commands could be used to check if DNS name resolution is working
properly on a Windows PC? (Choose two.)
ping cisco.com
net cisco.com
ipconfig /flushdns
nslookup cisco.com
nbtstat cisco.com
11. What are two shared characteristics of the IDS and the IPS? (Choose two.)
Both have minimal impact on network performance.
Both analyze copies of network traffic.
Both are deployed as sensors.
Both rely on an additional network device to respond to
malicious traffic.
Both use signatures to detect malicious traffic.
12. An attacker is sitting in front of a store and wirelessly copies emails and contact
lists from nearby unsuspecting user devices. What type of attack is this?
bluejacking
RF jamming
bluesnarfing
smishing
13. An organization allows employees to work from home two days a week. Which
technology should be implemented to ensure data confidentiality as data is
transmitted?
SHS
VLANS
RAID
VPN
14. A new PC is taken out of the box, started up and connected to the Internet.
Patches were downloaded and installed. Antivirus was updated. In order to further
harden the operating system what can be done?
Turn off the firewall.
Remove unnecessary programs and services.
Disconnect the computer from the network.
Give the computer a nonroutable address.
Install a hardware firewall.
Remove the administrator account.
15. Which type of networks poses increasing challenges to cybersecurity specialists
due to the growth of BYOD on campus?
wired networks
virtual networks
wireless networks
sneaker net
16. What are two types of attacks used on DNS open resolvers? (Choose two.)
ARP poisoning
resource utilization
cushioning
amplification and reflection
fast flux
17. What would be the target of an SQL injection attack?
database
email
DHCP
DNS
18. A security specialist is asked for advice on a security measure to prevent
unauthorized hosts from accessing the home network of employees. Which measure
would be most effective?
Implement a VLAN.
Implement intrusion detection systems.
Implement RAID.
Implement a firewall.
19. Match the network service with the description.
30. A flood of packets with invalid source IP addresses requests a connection on the
network. The server busily tries to respond, resulting in valid requests being
ignored. What type of attack has occurred?
TCP session hijacking
TCP reset
TCP SYN flood
UDP flood
31. Which Windows tool can be used by a cybersecurity administrator to secure
stand-alone computers that are not part of an active directory domain?
Windows Defender
Local Security Policy
Windows Firewall
PowerShell
32. Match the correct sequence of steps typically taken by a
threat actor carrying out a domain shadowing attack.
38. Which two options can limit the information discovered from port scanning?
(Choose two.)
encryption
firewall
authentication
intrusion prevention system
passwords
39. What does a rootkit modify?
Microsoft Word
operating system
programs
Notepad
screen savers
40. What is a nontechnical method that a cybercriminal would use to gather
sensitive information from an organization?
pharming
man-in-the-middle
social engineering
ransomeware
41. Match the commonly used ports on a Linux server with the corresponding
service.