Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

NSA EXAM 2024/2025 WITH 100% ACCURATE SOLUTIONS, Exams of Nursing

NSA EXAM 2024/2025 WITH 100% ACCURATE SOLUTIONS

Typology: Exams

2023/2024

Available from 08/30/2024

ACADEMICLINKS
ACADEMICLINKS 🇺🇸

3.9

(8)

3.1K documents

1 / 8

Toggle sidebar

Related documents


Partial preview of the text

Download NSA EXAM 2024/2025 WITH 100% ACCURATE SOLUTIONS and more Exams Nursing in PDF only on Docsity! NSA EXAM 2024/2025 WITH 100% ACCURATE SOLUTIONS NSA EXAM 2024/2025 WITH 100% ACCURATE SOLUTIONS You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solution? - Precise Answer ✔✔Encrypt it before sending. APU managers network devices in his store and maintains copies of the configuration files for all the managed router and switches. On a weekly basis, he creates hashes for these files and compares them with hashes he created on the same files the previous week. Which of the following uses cases is he MOST likely using?` - Precise Answer ✔✔Supporting Integrity Louie hid several plaintext documents within an image file. He then sent the image file to Tony. Which of the following BEST describes the purpose of his action? - Precise Answer ✔✔To support Obfuscation Management has mandated the use of digital signatures by all personnel within your organization. Which of the following uses cases does this primarily support? - Precise Answer ✔✔Supporting non-repudiation As the CTO, Marge is implementing a security program. She has included security controls to address confidentiality and availability. Of the following choices, what else should she include? - Precise Answer ✔✔Ensure systems are not susceptible to unauthorized changes.. confidentiality of credentials used to connect to these devices. Which of the following protocols would BEST meet this need? - Precise Answer ✔✔Simple Network Management Protocol version 3 (SNMPv3) Lisa is enabling The Network Time Protocol(NTP) on some servers within the DMZ. Which of the following uses cases is she MOST likely supporting with this action? - Precise Answer ✔✔Time Synchronization Your organization wants to increase security for Voice Over Internet Protocol (VolP) and video teleconferencing applications used within the network. Which of the following protocols will BEST support this goal? - Precise Answer ✔✔The Secure Real-Time Protocol (SRTP) provides encryption. Management within your organization wants to ensure that switches are not susceptible to switching loop problems. Which of the following protocols is the BEST choice to meet this need? - Precise Answer ✔✔Rapid Stp (RSTP) prevents switching loop problems. A network technician incorrectly wire switch connections in your organization's network. It effectively disabled the switch as though it was a victim of a "denial-of-service" attack. Which of the following should be done to prevent this situation in the future? - Precise Answer ✔✔Spanning Tree Protocol(STP) and Rapid STP (RSTP) both prevent switching loop problems. Developers recently configured a new service on Server A. Server A is in a DMZ and accessed by internal users and via the Internet. Network administrators modified firewall ruler to access the service. Testing shows the service works when accessed from the internal systems. However, it does not work when accessed from the Internet. Which of the following is MOST likely configured incorrectly? - Precise Answer ✔✔Access Control List (ACL's) You manage a Linux computer used for security within your network. You plan to use it to inspect and handle network-based traffic using iptables. Which of the following network devices can this replace? - Precise Answer ✔✔Firewall You need to implement antispoofing on a border router. Which of the following choices will BEST meet this goal? - Precise Answer ✔✔Create a rules to block all incoming traffic from a private IP address. An organization has recently had several attacks against servers within a DMZ. Security administrators discovered that many of these attacks are using TCP, but they did not start with the three way handshake. Which of the following devices provides the BEST solution? - Precise Answer ✔✔Stateful firewall filters traffic based on the state of the packet within a session. Which type of device would have the following entries used to define its operation? permit IP any any eq 80 permit IP any any eq 443 deny IP any any - Precise Answer ✔✔Firewall Your organization hosts a web server and wants to increase its security. You need to separate all web-facing traffic from internal network traffic. Which of the following provides the BEST solution? - Precise Answer ✔✔A demilitarized zone (DMZ): is a buffer zone between a private network and the Internet, and it will separate the web server's web- facing traffic from the internal network. Management at your organization wants to prevent employees from accessing social media sites using company-owned computers. Which of the following devices would you implement? - Precise Answer ✔✔A "Nontransparent proxy" includes the ability to to filter traffic based on the URL and is the best choice. You need to configure a Unified Threat Management(UTM) security appliance to restrict traffic going to social media sites. Which of the following are you MOST likely to configure? - Precise Answer ✔✔URL filter, this would block access to the sites based on their URL. Your organization recently purchased a sophisticated security appliance that includes a DDoS mitigator. Where should you place this device? - Precise Answer ✔✔At the border of the network, between the private network and the Internet. You are preparing to deploy a heuristic-based detection system to monitor network activity. Which of the following would you create first? - Precise Answer ✔✔Baseline