1.
Many unauthorized staff has been entering the data center by piggybacking authorized staff. The CIO has mandated to stop this behavior. Which technology should be installed at the data center to prevent piggybacking?
A. 
B. 
C. 
D. 
2.
Why will a Faraday cage be used?
A. 
To minimize weak encryption
B. 
C. 
To find rogue access points
D. 
To mitigate data emanation
3.
An enclosure that prevents radio frequency signals from emanating out of a controlled environment is BEST described as which of the following?
A. 
B. 
C. 
D. 
4.
Which one of the following options will create a security buffer zone between two rooms?
A. 
B. 
C. 
D. 
5.
As a network administrator you need to take personal safety into consideration. What fire suppression substances types can effectively prevent damage to electronic equipment?
A. 
B. 
C. 
D. 
6.
A Faraday case or Faraday shield is an enclosure formed by conducting material, or by a mesh of such material. Such an enclosure blocks out external static electrical fields. Faraday cages are named after physicist Michael Faraday, who built one in 1836. Which of the following would a Faraday cage prevent usage of?
A. 
Uninterruptible Power Supply (UPS)
B. 
C. 
D. 
7.
An administrator wants to make sure that no equipment is damaged when encountering a fire or false alarm in the server room. Which type of fire suppression system should be used?
A. 
B. 
C. 
D. 
8.
For the following options, which is an area of the network infrastructure that allows a technician to put public facing systems into it without compromising the entire infrastructure?
A. 
B. 
C. 
D. 
9.
In computing, a stateful firewall (any firewall that performs stateful packet inspection (SPI) or stateful inspection) is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. You have been studying stateful packet inspection and want to perform this security technique on the network. Which device will you use to BEST utilize stateful packet inspection?
A. 
B. 
C. 
D. 
10.
A company is upgrading the network and needs to reduce the ability of users on the same floor and network segment to see each other’s traffic. Which of the following network devices should be used?
A. 
B. 
C. 
D. 
11.
Coaxial cable is a cable consisting of an inner conductor, surrounded by a tubular insulating layer typically made from a flexible material with a high dielectric constant, all of which is then surrounded by another conductive layer (typically of fine woven wire for flexibility, or of a then metallic foil), and then finally covered again with a thin insulating layer on the outside. Which is the primary security risk with coaxial cable?
A. 
Data emanation from the core
B. 
C. 
Crosstalk between the wire pairs
D. 
Diffusion of the core light source
12.
Which statement best describes a static NAT?
A. 
A static NAT uses a one to many mapping
B. 
A static NAT uses a many to many mapping
C. 
A static NAT uses a many to one mapping
D. 
A static NAT uses a one to one mapping
13.
Which of the following is employed to allow distrusted hosts to connect to services inside a network without allowing the hosts direct access to the internal networks?
A. 
B. 
C. 
D. 
14.
Which media is LEAST susceptible to a tap being placed on the line?
A. 
B. 
C. 
D. 
15.
Fiber optic cable is considered safer than CAT5 because fiber optic cable (Select TWO)
A. 
Can be run for a longer distance
B. 
C. 
Is made of glass rather than copper
D. 
Is more difficult o install
E. 
Is not susceptible to interference
16.
Which of the following types of firewalls provides inspection at layer 7 of the OSI model?
A. 
B. 
C. 
D. 
Network address translation (NAT)
17.
A software or hardware device that allows only authorized network traffic in or out of a computer or network is called a:
A. 
B. 
C. 
D. 
18.
Internet filter appliances/servers will most likely analyze which three items? (Select THREE)
A. 
B. 
C. 
D. 
19.
Which item will MOST likely permit an attacker to make a switch function like a hub?
A. 
B. 
C. 
D. 
20.
A company implements an SMTP server on their firewall. This implementation would violate which of the following security principles?
A. 
Create an in-depth defense
B. 
C. 
D. 
21.
In computer networking, network address translation (NAT) is the process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another. Which description is true about a static NAT?
A. 
A static NAT uses a many to one mapping
B. 
A static NAT uses a one to one mapping
C. 
A static NAT uses a many to many mapping
D. 
A static NAT uses a one to many mapping
22.
Which method is easiest to disable a 10Base2 network?
A. 
B. 
C. 
D. 
23.
A company wants to connect the network to a manufacturer’s network to be able to order parts. Which of the following types of networks should the company implement to provide the connection while limiting the services allowed over the connection?
A. 
B. 
C. 
D. 
24.
Which of the following portions of a company’s network is between the Internet and an internal network?
A. 
B. 
C. 
D. 
25.
The MOST common exploits of Internet-exposed network services are due to:
A. 
B. 
Active content (e.g. Java Applets)
C. 
D.