11.1
11.2
11.3
extra
extra extra
100

What is the benefit of using lockable brackets and drawers within a rack?


To improve the Wi-Fi signal strength

To increase the storage capacity of the rack

To protect individual elements within a rack

To organize cables more efficiently

To protect individual elements within a rack

100

Why should all IoT devices be included in patch and vulnerability management audits?

answer

To assess their performance efficiency

To identify and mitigate known vulnerabilities

To ensure they are using the latest software versions

To evaluate their environmental impact

To identify and mitigate known vulnerabilities

100

You want to use CCTV as a preventative security measure.

Which of the following is a requirement for your plan?


Sufficient lighting

Security guards

PTZ camera

Low LUX or infrared camera

Security guards

100

Which of the following best describes the role of a sniffer in an Intrusion Detection System (IDS)?


It generates signature patterns for detecting malicious activity.

It encrypts network traffic to prevent unauthorized access.

It reads frames from a mirrored port to monitor network traffic.

It serves as a firewall to block malicious traffic.

It reads frames from a mirrored port to monitor network traffic.

100

Due to an increase in foot traffic from outside groups throughout the building, the organization asks their security office to employ equipment that will allow visual monitoring across the organization.

What equipment would best be suited to manage this request?


Motion Detection

Circuit

Cameras

Asset Tag

Cameras

200

What is a zone in the context of network security?


A segment of the network that is isolated for performance testing

An area of the network with a specific bandwidth allocation

A physical location within an organization

An area of the network where all hosts have the same level of trust


An area of the network where all hosts have the same level of trust

200

You are the IT security manager at a medium-sized enterprise. Recently, the company decided to implement smart building technology to improve energy efficiency and security. This technology includes smart thermostats, lighting, and access control systems. You are tasked with ensuring the security of these IoT devices.

Which of the following actions should you prioritize to secure the smart building technology?


Isolate the smart building technology network segments from the corporate data network.

Connect all smart devices directly to the corporate data network for easier management.

Encourage employees to manage the devices to increase engagement and awareness.

Use default configurations for all devices to ensure uniformity and ease of use.

Isolate the smart building technology network segments from the corporate data network.

200

What advantage does camera-based surveillance have over maintaining separate guards at each gateway or zone?


It is a cheaper means of monitoring.

It is more effective at detecting intrusions.

It requires no power supply.

It can replace all other security measures.

It is a cheaper means of monitoring.

200

What characterizes a static computing environment?

Limited support for correcting security issues

Frequent hardware and software changes

The ability to install new operating systems

High levels of user customization and data file management

Limited support for correcting security issues

200

Which security device is typically used to enforce rules between network zones?


Router

Access Point

Switch

Firewall


Firewall

300

Why are hosts in the perimeter network not fully trusted by the internal network?


Because they are directly connected to the internal network without any controls

Because they do not require any form of security

Because they could potentially be compromised from the Internet

Because they do not communicate with the internal network at all

Because they could potentially be compromised from the Internet

300

You are concerned about the security of your IoT devices. You have read about vulnerabilities that could allow hackers to gain unauthorized access to your smart home devices, such as your smart locks and security cameras.

Which of the following measures should you prioritize to enhance the security of your IoT devices?

Using proprietary operating systems for your devices

Increasing the battery life of the devices

Regularly updating the firmware of the devices

Connecting all devices to a high-capacity external storage

Regularly updating the firmware of the devices

300

What is the purpose of installing cages around racks in data centers?


To enhance the visual appeal of the data center

To improve air circulation around the equipment

To restrict access by technicians to their own equipment

To reduce the risk of electrical interference

To restrict access by technicians to their own equipment

300

Which of the following is a potential vulnerability of integrated peripherals in smart devices?

Increased battery life

Improved device performance

Facilitation of surveillance

Enhanced user experience

Facilitation of surveillance

300

What is the role of VLANs in network segmentation?

To provide wireless connectivity

To create separate broadcast domains

To enforce security policies at the application layer

To increase the physical security of network devices

To create separate broadcast domains

400

Which of the following servers should be placed in a perimeter network?


Database servers containing sensitive information

File servers used exclusively by internal employees

Web servers providing public access services

Internal email servers for employee communication

Web servers providing public access services

400

What is the primary function of an embedded system?


To perform a specific, dedicated function

To serve as a primary computing device for users

To facilitate high-speed internet connectivity

To run multiple applications simultaneously

To perform a specific, dedicated function

400

What is a badge reader used for in building security?


To detect motion at entry points

To provide lighting at entry points

To record the time employees leave the building

To authenticate users quickly at access points


To authenticate users quickly at access points

400

What is a vulnerability in integrating ICS/SCADA systems with corporate data networks?


Improved system interoperability

Enhanced data flow and efficiency

Vulnerable links that can be exploited

Increased system redundancy

Vulnerable links that can be exploited

400

You're concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible.

Which tool should you use?

Port scanner

Packet sniffer

IDS

IPS


IPS

500

What is a triple homed firewall configuration?


A configuration with three internal firewalls

A firewall setup without a perimeter network

A setup with three external firewalls

A firewall with three network interfaces


A firewall with three network interfaces

500

What is a "data historian" in the context of an ICS?

A database generated by the control loop

A communication protocol for PLCs

A cybersecurity tool for industrial networks

A backup server for industrial data

A database generated by the control loop

500

What can an organization use geofencing for?

To monitor the productivity of their employees

To increase the speed of their internet connection

To control the use of camera functions on devices

To improve the accuracy of their GPS systems

To control the use of camera functions on devices

500

What feature allows a security camera to survey a large room and pick out individual faces?


Coaxial cabling

Pan-Tilt-Zoom (PTZ) controls

Narrow focal length

Fixed positioning

Pan-Tilt-Zoom (PTZ) controls

500

What is the role of the screening firewall in a screened subnet?

To connect directly to the LAN

To filter communications between hosts in the perimeter and the LAN

To provide unrestricted access to the Internet

To restrict traffic on the external/public interface


To restrict traffic on the external/public interface