The link for the online exam is in the Step 1 folder and you…

The link for the online exam is in the Step 1 folder and you should have opened it in a new tab before you begin this test.Instructions:Before you begin your exam, hold up all sheets of paper you will be using to the camera to show that there is nothing written on it.Enter the password found below into the online exam tab open in Step 1 and complete the exam. Once completed, hold up each completed sheet of paper to the camera.Answer the Yes/No question below and proceed to the next question.The password for your online exam is: lobsterDO NOT SUBMIT OR CLOSE THIS BLACKBOARD EXAM before answering all the questions.Question:I have completed and submitted my online exam and I have held up all my sheets of paper (front and back) to record an image of them on the camera.

An international humanitarian organization uses encrypted me…

An international humanitarian organization uses encrypted messaging apps to communicate sensitive field reports. The developers decide to use RSA encryption for both key exchange and data encryption to simplify the architecture. Several months later, a security audit reveals serious performance issues and susceptibility to chosen ciphertext attacks (CCA) under certain configurations. Which of the following design decisions most likely led to this vulnerability?

Your organization is migrating its core network from traditi…

Your organization is migrating its core network from traditional L2/L3 switches to SDN-enabled switches managed by a centralized controller. During the migration, some segments of the network are operating on SDN switches while others are still using legacy infrastructure. Shortly after deployment, your team notices: Certain flows are not being forwarded as expected. Packet delivery across hybrid segments is inconsistent. Flow entries appear missing or outdated on several SDN switches. As the lead network engineer, you’re asked to diagnose the issue.Which of the following is the most likely cause, and why?

A cybersecurity analyst is reviewing encrypted messages sent…

A cybersecurity analyst is reviewing encrypted messages sent between two field agents. The encryption uses a symmetric key, which was securely exchanged beforehand. However, during a mission, the adversary manages to steal the encrypted message and attempts to replay it later. You’re called in to harden the system against this kind of attack. Which of the following countermeasures should be prioritized, and why?

Your red team creates an attack graph to evaluate how an adv…

Your red team creates an attack graph to evaluate how an adversary might compromise a cloud-based infrastructure. Each node represents a system state (e.g., “user shell access on VM1”) and each edge represents an exploit or transition between states. You observe multiple paths leading to the goal node: “root access on critical DB server.” Some paths contain cycles (loops), and one path includes re-use of stolen credentials and lateral movement across virtual machines. Which of the following best explains why certain paths in the attack graph include loops?

Your company is deploying a cloud environment using Open vSw…

Your company is deploying a cloud environment using Open vSwitch (OVS) in an SDN architecture to connect virtual machines (VMs) hosted on different compute nodes. The SDN controller (running OpenFlow 1.3) proactively installs flow rules in the OVS instances to optimize traffic handling. After deployment, the network team notices unexpected latency and high CPU usage on several hypervisors. On inspection, they find that most packets are being forwarded via user space in OVS instead of the expected kernel space fast path. Given this scenario, which of the following is the most likely cause of the performance degradation?