Your organization is migrating its core network from traditi…

Your organization is migrating its core network from traditional L2/L3 switches to SDN-enabled switches managed by a centralized controller. During the migration, some segments of the network are operating on SDN switches while others are still using legacy infrastructure. Shortly after deployment, your team notices: Certain flows are not being forwarded as expected. Packet delivery across hybrid segments is inconsistent. Flow entries appear missing or outdated on several SDN switches. As the lead network engineer, you’re asked to diagnose the issue.Which of the following is the most likely cause, and why?

A cybersecurity analyst is reviewing encrypted messages sent…

A cybersecurity analyst is reviewing encrypted messages sent between two field agents. The encryption uses a symmetric key, which was securely exchanged beforehand. However, during a mission, the adversary manages to steal the encrypted message and attempts to replay it later. You’re called in to harden the system against this kind of attack. Which of the following countermeasures should be prioritized, and why?

Your red team creates an attack graph to evaluate how an adv…

Your red team creates an attack graph to evaluate how an adversary might compromise a cloud-based infrastructure. Each node represents a system state (e.g., “user shell access on VM1”) and each edge represents an exploit or transition between states. You observe multiple paths leading to the goal node: “root access on critical DB server.” Some paths contain cycles (loops), and one path includes re-use of stolen credentials and lateral movement across virtual machines. Which of the following best explains why certain paths in the attack graph include loops?

Your company is deploying a cloud environment using Open vSw…

Your company is deploying a cloud environment using Open vSwitch (OVS) in an SDN architecture to connect virtual machines (VMs) hosted on different compute nodes. The SDN controller (running OpenFlow 1.3) proactively installs flow rules in the OVS instances to optimize traffic handling. After deployment, the network team notices unexpected latency and high CPU usage on several hypervisors. On inspection, they find that most packets are being forwarded via user space in OVS instead of the expected kernel space fast path. Given this scenario, which of the following is the most likely cause of the performance degradation?