February 2022

Article

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Matt would like to determine all of the IP addresses assigned to active interfaces on his local system. What command can he use to determine this information? A. Netstat B. Netcat C. Ipconfig D. Address Resolution Protocol(ARP) Correct Answer: C The ipconfig command (on Windows) and ifconfig command (on Linux) return information about the network interfaces on a device, including all assigned IP addresses, making it our correct answer here. The netstat command is used to display active network connections, so that is incorrect. The netcat command is used to send traffic to a network socket, making it another incorrect answer. The arp command is used to look up MAC addresses with the Address Resolution Protocol (ARP), so it is not what we are looking for either. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Brandy is working to secure her network using a defense-in-depth strategy. As part of that approach, she is dividing systems onto network VLANs based upon their functional role. What term best describes this strategy? A. Segmentation B. Containment C. Isolation D. Recovery Correct Answer: A Isolation, containment, and recovery are actions taken in response to a security incident, rather than proactive security measures. This is a clear example of network segmentation: dividing systems onto smaller networks based upon function. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Tina is implementing a network access control solution for an open guest network. She would like to use an approach that does not require installing software on systems joining the network but can limit them to a quarantine network until they successfully pass a health check. What NAC solution would best meet her needs? A. Agent-Based B. Captive Portal C. Post-Admission D. Out of Band Correct Answer: B Captive portals are websites where unvalidated systems are redirected until they complete the admission process. Which makes this an inline approach, meaning that the captive portal is the best solution for Tina. The use of an out-of-band, or agent-based approach would require the installation of software on the device, violating one of the requirements. Post-admission NAC would allow the system on the network and only block it if it exhibited suspicious behavior, not meeting the basic requirement of the scenario. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...