The link for the online exam is in the Step 1 folder and you…

The link for the online exam is in the Step 1 folder and you should have opened it in a new tab before you begin this test.Instructions:Before you begin your exam, hold up all sheets of paper you will be using to the camera to show that there is nothing written on it.Enter the password found below into the online exam tab open in Step 1 and complete the exam. Once completed, hold up each completed sheet of paper to the camera.Answer the Yes/No question below and proceed to the next question.The password for your online exam is: lobsterDO NOT SUBMIT OR CLOSE THIS BLACKBOARD EXAM before answering all the questions.Question:I have completed and submitted my online exam and I have held up all my sheets of paper (front and back) to record an image of them on the camera.

Your organization is deploying Service Function Chaining (SF…

Your organization is deploying Service Function Chaining (SFC) to enforce traffic-specific security policies. Two clients require different treatment: Client A: Handles classified data and must go through a Firewall, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) service functions. Client B: Engages in high-speed data crawling and only needs a Firewall and Network Address Translation (NAT). You plan to use flow metadata (e.g., IP headers or VLAN tags) to assign traffic to appropriate chains dynamically. Which of the following best ensures that both clients’ traffic receives correct and policy-compliant treatment?

Your organization recently deployed a Linux-based firewall u…

Your organization recently deployed a Linux-based firewall using iptables with custom rules for packet filtering. After deployment, users report that they cannot access a public-facing web server hosted internally, even though the rule -A INPUT -p tcp –dport 80 -j ACCEPT exists. Upon reviewing the rules, you find the following: -A INPUT -m conntrack –ctstate ESTABLISHED,RELATED -j ACCEPT-A INPUT -p icmp -j ACCEPT-A INPUT -p tcp –dport 22 -j ACCEPT-A INPUT -p tcp –dport 80 -j ACCEPT-A INPUT -j DROP

A cybersecurity analyst is reviewing encrypted messages sent…

A cybersecurity analyst is reviewing encrypted messages sent between two field agents. The encryption uses a symmetric key, which was securely exchanged beforehand. However, during a mission, the adversary manages to steal the encrypted message and attempts to replay it later. You’re called in to harden the system against this kind of attack. Which of the following countermeasures should be prioritized, and why?