Q1. Which of the following are common areas of vulnerabilities in a network switch? (Choose two.)
A.Default port state
B. Default credentials
C. Default protocols
D. Default encryption
E. Default IP address
Correct Answer: A, B
Q2. Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)
A.Installing patches
B. Updating configurations
C. Documenting exceptions
D. Conducting audits
E. Generating reports
Correct Answer: A, B
Q3. To minimize vulnerability, which steps should an organization take before deploying a new Internet of Things (IoT) device? (Choose two.)
A.Changing the default password
B. Updating the device firmware
C. Setting up new users
D. Disabling IPv6
E. Enabling the firewall
Correct Answer: B, E
Q4. Which of the following would MOST likely make a Windows workstation on a corporate network vulnerable to remote exploitation?
A.Disabling Windows Updates
B. Disabling Windows Firewall
C. Enabling Remote Registry
D. Enabling Remote Desktop
Correct Answer: D
$ 39
Reviews
There are no reviews yet.