Wildcard
Attacks
Simulation
200

Which of the following is the most versatile cloud model?

     a.     IaaS
     b.     PaaS
     c.     SaaS
     d.     XaaS

a. Correct. Infrastructure as a service (IaaS) is the most versatile cloud model since only the computing resources are provided by cloud service providers, and the majority of the administration can be done by the client.

200

Sam is asked to help his company design a wireless network for their new location.

Which of the following protocols has the strongest wireless security, supports a longer bit of encryption, and improved interaction capabilities with the internet of things (IoT) devices?

     a.     WPA2
     b.     WPA3
     c.     WPA
     d.     WEP

b. WPA3. WPA3 aims to deliver a suite of features to simplify security configuration for users while enhancing network security protections. The WPA3 SAE is designed to increase security at the handshake when keys are being exchanged. The result is that WPA3 can give stronger security even if short or weak passwords are used.

200

Shawn is approached by a medical staff team with a request to research and introduce a type of device that will help them record and transmit specific patient details.


Which technology would help the team measure and monitor blood pressure and then send those patient details from the device to a phone as a message in case of emergencies?

     a.     NFC
     b.     RFID
     c.     Bluetooth
     d.     WLAN network

c. Correct. Bluetooth is a wireless technology that uses short-range RF transmissions. It enables users to connect wirelessly to a wide range of computing and telecommunications devices by providing for rapid "on-the-fly" connections between Bluetooth-enabled devices. A smart tracker or watch can detect and measure blood pressure and send alerts to other devices.

400

Which of the following can be achieved using availability zones in cloud computing?

     a.     Fault tolerance
     b.     Less redundancy
     c.     More visibility
     d.     Lower cost

a. Correct. Deploying applications across multiple availability zones increases fault tolerance the same way as when a zone fails, other zones fill the gap.

400

Under which vulnerability can an attacker steal information from a user's phone using a device to connect to the phone without physically touching it?

     a.     Eavesdropping
     b.     Data theft
     c.     Man-in-the-middle
     d.     Device theft

b. Correct. In data theft, attackers use NFC to connect a portable reader to a user's smartphone in a crowd to steal payment information stored on the phone.

400

Melvin is moving his small business from his basement to an office building now that he has five full-time employees. What type of enterprise AP should he choose when setting up the new office's WLAN?

     a.     Fat AP
     b.     Controller AP
     c.     Captive portal AP
     d.     Ad hoc AP

a. Correct. Fat APs are autonomous and entirely self-contained. Their autonomous functioning makes them ideal for small offices with a handful of APs. In large enterprises or college campuses with hundreds or even thousands of APs, fat APs are not a viable option because each AP is autonomous. A single wireless network configuration change will require reconfiguring each AP individually, which can take an extended period and manpower to complete.

600

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply?

     a.     Containers use Type I hypervisors for virtualization
     b.     Containers use OS components for virtualization
     c.     Containers use dedicated physical storage for virtualization
     d.     Containers use hardware hypervisors for virtualization

b. Correct. Containers use OS components like binaries and libraries for virtualization.

600

What is the difference between protecting against eavesdropping and protecting against a man-in-the-middle (MITM) attack when working with devices with NFC?

     a.     Eavesdropping can be prevented by strong passwords and PINs, while MITM attacks can be prevented by being aware of one's surroundings while using NFC technology.
     b.     Eavesdropping can be prevented by configuring in a pairing method so only one side can send and the other can receive it at a time, while MITM can be prevented by using strong passwords and PINs.
     c.     Eavesdropping can be prevented by being aware of one's surroundings while using NFC technology, while MITM attack can be prevented by configuring in a pairing method so only one side can send and the other can receive it at a time.
     d.     Eavesdropping can be prevented by turning off NFC while in public, while MITM attack can be protected by using strong passwords and PINs.

c. Correct. In eavesdropping attacks, the attacker must be extremely close to pick up the signal; hence, it can be prevented if users are aware of their surroundings while making a payment. In MITM attacks, the attacker can interfere with NFC communications between devices and send false responses. This can be prevented by configuring the device in pairing so one device can only send while the other can only receive.

600

Bob has been asked to do research into increasing the accuracy in identifying rogue APs in his enterprise. Which rogue AP system detection probe will allow his company's IT department to monitor the airwaves for traffic, scan and record wireless signals within its range (even when the device is idle or not receiving any transmission), and then report this information to a centralized database?

     a.     Access point probe
     b.     Wireless device probe
     c.     Desktop probe
     d.     Dedicated probes

b. Correct. Standard wireless devices, such as portable laptop computers, can be configured to act as wireless probes. At regular intervals during the normal course of operation, the device can scan and record wireless signals within its range and report this information to a centralized database. The scanning is performed when the device is idle and not receiving any transmissions. Using several mobile devices as wireless device probes can provide a high degree of accuracy in identifying rogue access points.

800

In an interview, the interviewer asks you to boot a PC. A hypervisor screen appears at the start of the boot process. The interviewer then asks you to identify the type of VM monitor program being used. What should your reply be?

Type 1 hypervisor. Type I hypervisors run guest OSs directly on the hardware.

800

Zara has been instructed to organize an event where top companies will come and give a webinar. Since the event is large and the number of people attending is substantial, Zara needs to ensure that there are no disturbances. She thinks preventing devices from communicating and calls from being made or received is the easiest solution.

Which factor should Zara use to achieve this?

Jamming. Jamming prevents the transmission of data to or from network devices by intentionally flooding the RF spectrum with extraneous RF signal "noise" that creates interference and prevents communications from occurring.

800

Justin works for an automobile manufacturer. The company is designing a new car that enables the users to use the car as a mobile office. To achieve this, the car must have a hands-free system where drivers can use voice controls to browse their phone's contact list, make and receive hands-free phone calls, mirror a smartphone screen on the LED dash display, and use navigation and entertainment apps.

Which technology should he use and why?

Bluetooth, because it can be used to pair devices, allowing for hands-free and screen mirroring features. Bluetooth is a wireless technology that uses short-range RF transmissions. It enables users to connect wirelessly to a wide range of computing and telecommunications devices by providing for rapid "on-the-fly" connections between Bluetooth-enabled devices. Bluetooth provides the ability to mirror screens, use voice controls, and access the internet.

1000

Which protocol can be used for secure video and voice calling?

SRTP. The secure real-time transfer protocol (SRTP) provides encryption, authentication, and integrity for voice and video technology.

1000

Why are jamming attacks generally rare?

They require expensive, sophisticated equipment. Jamming attacks generally are rare because sophisticated and expensive equipment is necessary to flood the RF spectrum with enough interference to impact the network.

1000

Your enterprise recently decided to hire new employees as work-from-home interns. For the new employees to work from home, you need to create a network that will allow them to securely access enterprise data from remote locations.

Which technology should you use?

VPN. Creating a virtual private network using VPN protocol allows remote access with encryption and authentication.

M
e
n
u