Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that require some improvement:
- Which of the following is a type of malware that is designed to encrypt your data?
A. Worm
B. Ransomware
C. Polymorphic
D. Trojan
- A security professional implements multiple security components to improve the security posture of the organization. What is the security professional trying to do?
A. Install anti-malware on all devices.
B. Install host-based firewalls on all end devices.
C. Implement email security.
D. Implement Defense in Depth.
- A threat actor is attempting to force a switch to flood all its inbound traffic out of all other ports. What type of attack is the threat actor performing?
A. IP spoofing
B. CAM table overflow
C. Man-in-the-middle
D. ARP spoofing
- Another attacker is attempting to gain unauthorized access to a VLAN. What type of attack is being performed by the attacker?
A. An
802.1Q
attackB. A DTP attack
C...