1.
In TCP protocol header “checksum” is of _____________
Correct Answer
B. 16 bit
Explanation
The TCP protocol header includes a field called "checksum" which is used for error detection. The checksum field is 16 bits in size. This means that it can store a value ranging from 0 to 65535. The purpose of the checksum is to ensure the integrity of the data being transmitted over the network. By calculating and verifying the checksum, the receiver can detect if any errors have occurred during transmission. The larger the size of the checksum field, the more possible values it can represent, allowing for a higher level of error detection.
2.
MTU is specified by __________
Correct Answer
C. TCP Segment Size
Explanation
The Maximum Transmission Unit (MTU) is specified by the TCP Segment Size. MTU refers to the maximum size of a packet or frame that can be transmitted over a network. In the case of TCP, data is divided into segments before transmission, and the size of these segments is determined by the TCP Segment Size. Therefore, the TCP Segment Size directly affects the maximum size of the packets that can be transmitted, thus determining the MTU.
3.
Flow control takes place at which layer?
Correct Answer
B. Transport Layer
Explanation
Flow control takes place at the Transport Layer. This layer is responsible for ensuring reliable and error-free delivery of data between the source and destination. Flow control mechanisms regulate the rate of data transmission, preventing the sender from overwhelming the receiver with data. It manages the flow of data packets, ensuring that the receiver can handle the incoming data at a pace it can process. This helps in avoiding congestion and data loss in the network.
4.
What happens if a DHCP client that already has a valid lease starts up after a power-down or reboot?
Correct Answer
D. Sends a DHCPREQUEST message to Server
Explanation
When a DHCP client that already has a valid lease starts up after a power-down or reboot, it sends a DHCPREQUEST message to the DHCP server. This message is used by the client to request the renewal of its lease from the server. By sending this message, the client informs the server that it wants to continue using the same IP address and other network configuration settings. The server will then respond to the request by either renewing the lease or providing a new lease to the client.
5.
Which of the following statements is true about 10.0.0.1 IP address sending gratuitous arp?
Correct Answer
C. Sender IP and Target IP address will be same
Explanation
In gratuitous ARP, the sender sends an ARP request packet with its own IP address as both the source and destination IP address. This is done to update the ARP cache of other devices in the network. Therefore, the statement "Sender IP and Target IP address will be the same" is true.
6.
Which Transport layer protocol is used by DNS?
Correct Answer
C. Both TCP and UDP
Explanation
DNS (Domain Name System) uses both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) as transport layer protocols. TCP is used for zone transfers and for maintaining a connection during a DNS query that requires a large response. UDP is used for regular DNS queries, where a quick and lightweight communication is needed. The choice between TCP and UDP depends on the specific DNS operation being performed.
7.
In DNS Which record type is associated with Service Locator ?
Correct Answer
B. SRV Record
Explanation
The SRV (Service Locator) record is associated with DNS. It is used to specify the location of services, such as servers for specific protocols, within a domain. SRV records contain information about the target server's hostname, port number, priority, and weight. This allows clients to easily locate and connect to the appropriate servers for specific services.
8.
In DNS which records must be registered at the TLD name server?
Correct Answer
A. NS Record
Explanation
The NS (Name Server) record must be registered at the TLD (Top-Level Domain) name server. This record specifies the authoritative name servers for a particular domain. It indicates which name servers are responsible for handling DNS queries for that domain. By registering the NS record at the TLD name server, the domain owner ensures that the correct name servers are associated with their domain and can properly handle DNS requests.
9.
In which mode of FTP, the client initiates both the control and data connections.
Correct Answer
C. Passive Mode
Explanation
Passive mode is the correct answer because in this mode, the client initiates both the control and data connections. In passive mode, the client sends a PASV command to the server, which responds with an IP address and port number. The client then connects to that IP address and port number to establish the data connection. This mode is commonly used when the client is behind a firewall or NAT router, as it allows the client to establish the data connection without any issues.
10.
HTTP options are supported from which version of HTTP?
Correct Answer
B. HTTP 1.1
Explanation
HTTP options are supported from HTTP 1.1 version onwards. This means that the HTTP OPTIONS method, which allows a client to request information about the communication options available for a target resource, was introduced in HTTP 1.1. In previous versions like HTTP 1.0 and HTTP 0.9, the OPTIONS method was not available. HTTP 2.0 also supports the OPTIONS method, but it was first introduced in HTTP 1.1.
11.
What does server mean if it sends HTTP status code 304?
Correct Answer
C. Not Modified
Explanation
When a server sends an HTTP status code 304, it means that the requested resource has not been modified since the last time it was accessed. This status code is used to indicate that the client's cached version of the resource is still valid and can be used instead of requesting the entire resource again. It helps to reduce bandwidth usage and improve performance by allowing the client to use its cached copy of the resource.
12.
Which of the following is not a valid HTTP method?
Correct Answer
C. PUSH
Explanation
The HTTP method "PUSH" is not a valid HTTP method. The valid HTTP methods are GET, DELETE, and TRACE. The PUSH method does not exist in the HTTP specification and is not recognized by servers or browsers.
13.
Which response code is sent by the server in response to PUT or POST request?
Correct Answer
C. 201
Explanation
The correct answer is 201. When a server receives a PUT or POST request, it can respond with a 201 status code, which indicates that the request was successful and a new resource has been created as a result. This status code is commonly used in RESTful APIs to indicate that a new resource has been successfully created and is available at the provided URL.
14.
HTTP is a stateless protocol.
Correct Answer
B. False
Explanation
HTTP is actually a stateless protocol, meaning that it does not retain any information about previous requests or sessions. Each request is treated as an independent transaction, and the server does not store any information about the client between requests. This allows for scalability and simplicity in the design of web applications. However, there are mechanisms such as cookies and session management techniques that can be used to maintain state in HTTP applications.
15.
In tunnel mode IPsec protects the :
Correct Answer
A. Entire IP Packet
Explanation
In tunnel mode IPsec, the entire IP packet is protected. This means that not only the IP payload (the data being transmitted), but also the IP header (which contains important information about the packet) are encrypted and authenticated. This ensures the confidentiality, integrity, and authenticity of the entire packet during transmission.
16.
The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.
Correct Answer
A. Transport Mode
Explanation
The Transport Mode is the correct answer because it provides host-to-host protection of data. In this mode, only the payload (data) of the IP packet is encrypted, while the IP header remains intact. This allows for end-to-end protection of the data, ensuring that it is secure during transmission between the source and destination hosts. Tunnel Mode, on the other hand, is used for securing communication between networks rather than individual hosts.
17.
In the IP Header, If the value in protocol field is 51, the protocol used is ____.
Correct Answer
B. AH
Explanation
In the IP Header, if the value in the protocol field is 51, the protocol used is AH.
18.
In main mode exchange, NAT discovery takes place in which exchange?
Correct Answer
B. II exchange (3rd and 4th message).
19.
How many IKE SAs are possible between two gateway IP address?
Correct Answer
D. One Bidirectional SA
Explanation
The correct answer is "One Bidirectional SA." In the context of IKE (Internet Key Exchange), an SA (Security Association) is a one-way logical connection that provides security services between two IP addresses. A bidirectional SA allows for secure communication in both directions, meaning that it can handle traffic going from one gateway IP address to another and vice versa. Therefore, only one bidirectional SA is needed between two gateway IP addresses to establish secure communication.
20.
In quick mode (phase 2), key exchange is performed due to which of the following option?
Correct Answer
D. PFS
Explanation
In quick mode (phase 2), key exchange is performed to establish a new session key for secure communication between two parties. Perfect Forward Secrecy (PFS) is a feature that ensures that even if the long-term secret key is compromised in the future, the session keys derived from it will remain secure. Therefore, PFS is the correct option for key exchange in quick mode.
21.
Two connected routers are configured with RIP routing. What will be the result when a router receives a routing update that contains a higher-cost path to a network already in its routing table?
Correct Answer
B. The update will be ignored and no further action will occur.
Explanation
When a router receives a routing update that contains a higher-cost path to a network already in its routing table, the update will be ignored and no further action will occur. This is because RIP (Routing Information Protocol) uses a distance-vector algorithm, where routers exchange routing updates based on the number of hops to reach a network. If a higher-cost path is received, it is considered less favorable and therefore ignored. The router will continue to use the existing routing table entry for that network.
22.
How many port states do we have in STP?
Correct Answer
C. 5
Explanation
In STP (Spanning Tree Protocol), there are five port states. These port states include Blocking, Listening, Learning, Forwarding, and Disabled. These states determine the role and functionality of each port in the STP network. The Blocking state is used to prevent loops, the Listening state prepares to forward data, the Learning state populates the MAC address table, the Forwarding state forwards data, and the Disabled state indicates that the port is not participating in the STP. Therefore, the correct answer is 5.
23.
What is data encryption standard (DES)?
Correct Answer
A. Block cipher
Explanation
DES, which stands for Data Encryption Standard, is a block cipher. A block cipher is a type of encryption algorithm that operates on fixed-size blocks of data. In the case of DES, the block size is 64 bits. It encrypts data by dividing it into blocks and applying a series of mathematical transformations to each block. DES has been widely used for secure communication and data protection, although it has been largely replaced by more advanced encryption algorithms due to its relatively small key size and vulnerability to attacks.
24.
What does byte 1 and 2 represent in SSL/TLS record header?
Correct Answer
C. Version
Explanation
Bytes 1 and 2 in the SSL/TLS record header represent the version of the SSL/TLS protocol being used. The version information is crucial for both the client and server to ensure compatibility and establish a secure connection. It allows the communicating parties to understand and interpret the data exchanged between them correctly. By examining the version bytes, the client and server can determine if they support the same SSL/TLS protocol version and proceed accordingly with the handshake process.
25.
A SSL Connection failed with Alert Code 44. What could be the reason?
Correct Answer
B. Received a certificate that was revoked by its signer.
Explanation
If a SSL connection fails with Alert Code 44, it means that the certificate received during the connection process has been revoked by its signer. This could happen if the certificate authority (CA) or the entity that issued the certificate has deemed it invalid or compromised after it was issued. This could be due to various reasons such as suspicion of unauthorized use, security breaches, or expiration of the certificate.
26.
Find the incorrect TCP flag from the options listed Below.
Correct Answer
B. CWN
27.
Original TCP header is also included along with the Pseudo header and data while calculating TCP Checksum.
Correct Answer
A. True
Explanation
The statement is true because when calculating the TCP checksum, the original TCP header, along with the pseudo header and data, is included. The TCP checksum is used to ensure the integrity of the TCP segment during transmission. By including the original TCP header, any changes or errors in the header can be detected, providing a more accurate checksum calculation.
28.
What is the maximum data that can be transmitted during TCP three way handshake?
Correct Answer
D. None of the above
Explanation
The maximum data that can be transmitted during TCP three-way handshake is actually 0 bytes. The three-way handshake is the process of establishing a TCP connection between two devices, and it involves the exchange of SYN and ACK packets. During this process, no actual data is transmitted, as the purpose is to synchronize sequence numbers and establish the connection. Therefore, none of the options provided (1460 bytes, 1500 bytes, or 536 bytes) are correct.
29.
In VPNs, the term "tunnelling" refers to :
Correct Answer
B. The encapsulation packets inside packets of different protocol to create and maintain the virtual circuit.
Explanation
In VPNs, "tunnelling" refers to the process of encapsulating packets inside packets of a different protocol to create a virtual circuit. This allows for secure communication over an untrusted network by creating a private and encrypted connection between the sender and receiver. Tunnelling ensures that the original packets are protected and remain confidential during transmission.
30.
What are the main benefit of VPNs compared to dedicated networks utilizing frame relay, leased lines and traditional dial-up ?
Correct Answer
C. Reduced Cost
Explanation
VPNs offer reduced cost compared to dedicated networks utilizing frame relay, leased lines, and traditional dial-up. This is because VPNs utilize existing internet connections instead of requiring expensive dedicated lines. By using VPNs, organizations can avoid the costs associated with purchasing and maintaining dedicated network infrastructure. Additionally, VPNs eliminate the need for long-distance charges that are often incurred with traditional dial-up connections. Therefore, organizations can achieve cost savings by implementing VPNs as opposed to dedicated networks.
31.
Which of the following elements of PKI are found in a browser's trusted root CA?
Correct Answer
D. Public Key
Explanation
A browser's trusted root CA contains the public keys of trusted certificate authorities. These public keys are used to verify the authenticity and integrity of digital certificates issued by the certificate authorities. The private key, symmetric key, and recovery key are not typically found in a browser's trusted root CA as they are used for different purposes such as encryption, decryption, and data recovery.
32.
Which of the following protocols should be blocked at the network perimeter to prevent host enumeration by sweep devices?
Correct Answer
D. ICMP
Explanation
ICMP (Internet Control Message Protocol) should be blocked at the network perimeter to prevent host enumeration by sweep devices. ICMP is commonly used for network diagnostics and troubleshooting, but it can also be exploited by attackers to gather information about hosts on a network. By blocking ICMP, sweep devices will not receive responses from hosts, making it more difficult for them to determine which hosts are active on the network. Blocking ICMP helps to enhance network security and prevents potential attacks that rely on host enumeration.
33.
Centrally authenticating multiple systems and applications against a federated user database is an example of:
Correct Answer
C. Single Sign on
Explanation
Centrally authenticating multiple systems and applications against a federated user database refers to the concept of Single Sign-On (SSO). SSO allows users to access multiple systems and applications with just one set of login credentials, eliminating the need for separate authentication for each system. This enhances user convenience and productivity while maintaining security. Therefore, the given correct answer is Single Sign-On.
34.
Which of the following is the primary purpose of using a digital signature? (Select TWO).
Correct Answer(s)
B. Integrity
D. Non-repudiation
Explanation
The primary purpose of using a digital signature is to ensure the integrity of a digital document or message, meaning that it has not been tampered with or altered during transmission. Digital signatures also provide non-repudiation, meaning that the sender cannot deny having sent the document or message. Encryption, confidentiality, and availability are not the primary purposes of using a digital signature.
35.
When examining HTTP server logs the security administrator notices that the company's online store crashes after a particular search string is executed by a single external user.Which of the following BEST describes this type of attack?
Correct Answer
D. DoS
Explanation
This type of attack is a Denial of Service (DoS) attack. In this scenario, a single external user is executing a search string that causes the company's online store to crash. A DoS attack aims to disrupt or disable the targeted system or network, making it unavailable to its intended users. The attacker overwhelms the system with excessive traffic or resource consumption, causing it to crash or become unresponsive.
36.
Which of the following would allow traffic to be redirected through a malicious machine by sending false hardware address updates to a switch?
Correct Answer
A. ARP Poisoning
Explanation
ARP Poisoning is a technique used to redirect network traffic through a malicious machine by sending false hardware address updates to a switch. By poisoning the Address Resolution Protocol (ARP) cache of a target machine, the attacker can associate their own MAC address with the IP address of another machine on the network. This causes the switch to send traffic intended for the other machine to the attacker's machine instead, allowing them to intercept and manipulate the traffic. MAC Spoofing, PWWN Spoofing, and DNS Poisoning are unrelated techniques and do not involve redirecting traffic through a malicious machine.
37.
Public keys are used for which of the following?
Correct Answer
B. Decrypting the hash of an electronic signature
Explanation
Public keys are used for decrypting the hash of an electronic signature. In public key cryptography, a sender uses their private key to create a hash of a message, which is then encrypted using their public key. The recipient can then decrypt the hash using the sender's public key and compare it to the original message to verify the integrity and authenticity of the message.
38.
A security administrator wants to prevent users in sales from accessing their servers after 6:00 p.m., and prevent them from accessing accounting's network at all times.Which of the following should the administrator implement to accomplish these goals? (Select TWO).
Correct Answer(s)
B. Time of Day restriction
C. Access Control List
Explanation
The security administrator should implement the "Time of Day restriction" to prevent users in sales from accessing their servers after 6:00 p.m. This feature allows the administrator to set specific time periods during which users are allowed or denied access to certain resources. Additionally, the administrator should also implement an "Access Control List" (ACL) to prevent users in sales from accessing accounting's network at all times. An ACL is a set of rules that determine the permissions and restrictions for accessing network resources, and can be used to limit access between different network segments or user groups.
39.
A user reports that their 802.11n capable interface connects and disconnects frequently to an access point that was recently installed.The user has a Bluetooth enabled laptop. A company in the next building had their wireless network breached last month.Which of the following is MOST likely causing the disconnections?
Correct Answer
C. The new access point was mis-configured and is interfering with another nearby access point.
Explanation
The most likely cause of the frequent disconnections is that the newly installed access point was misconfigured, causing interference with another nearby access point. This interference could be due to overlapping channels or other configuration issues that are causing conflicts between the two access points. The fact that the user's interface is 802.11n capable suggests that it is capable of connecting to the access point, but the frequent disconnections indicate a problem with the configuration rather than a problem with the user's device.
40.
Which of the following should the security administrator look at FIRST when implementing an AP to gain more coverage?
Correct Answer
B. Power Levels
Explanation
The security administrator should look at power levels first when implementing an AP to gain more coverage. Power levels determine the strength of the wireless signal and can be adjusted to increase the coverage area. By optimizing the power levels, the administrator can ensure that the AP provides sufficient coverage without causing interference or overlapping with other APs. Once the power levels are set appropriately, other factors like encryption methods, SSID, and radio frequency can be considered to enhance security and optimize performance.
41.
Which of the following is a security threat that hides itself within another piece of executable software?
Correct Answer
C. Trojan
Explanation
A Trojan is a type of security threat that disguises itself within another piece of executable software. It appears harmless or even desirable to the user, but once executed, it can perform malicious activities without the user's knowledge or consent. This can include stealing sensitive information, damaging files, or giving unauthorized access to the attacker. Unlike a virus or worm, a Trojan does not replicate itself but relies on the user to unknowingly execute it. Therefore, a Trojan is an effective tool for hackers to gain unauthorized access and control over a victim's computer.
42.
Which of the following standards encodes messages blocks of 64-bit and uses 56 bits for the encryption key?
Correct Answer
C. DES
Explanation
DES (Data Encryption Standard) is a symmetric encryption algorithm that encodes message blocks of 64 bits and uses a 56-bit encryption key. It is a widely used encryption standard that was developed in the 1970s and has been widely adopted for various applications. DES operates on a Feistel network structure and uses a combination of substitution and permutation techniques to encrypt and decrypt data. Despite its widespread usage in the past, DES is now considered to be relatively weak due to advances in computing power and the availability of more secure encryption algorithms.
43.
Which of the following algorithms have the smallest key space?
Correct Answer
D. DES
Explanation
DES (Data Encryption Standard) has the smallest key space among the given algorithms. This means that DES has the fewest possible combinations of keys that can be used for encryption and decryption. The key space of DES is 56 bits, which is relatively small compared to the key spaces of IDEA (128 bits), SHA-1 (160 bits), and AES (128, 192, or 256 bits depending on the key size). A smaller key space makes DES more vulnerable to brute-force attacks, where an attacker systematically tries all possible keys until the correct one is found.
44.
Which of the following describes the difference between a secure cipher and a secure hash?
Correct Answer
C. A cipher can be reversed, a hash cannot
Explanation
A cipher can be reversed, meaning that it is possible to decrypt the encrypted message and retrieve the original plaintext. On the other hand, a hash cannot be reversed. A hash function is a one-way function that takes an input and produces a fixed-size output, known as a hash value or digest. It is practically infeasible to retrieve the original input from the hash value. Therefore, the difference between a secure cipher and a secure hash lies in their reversibility.
45.
Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?
Correct Answer
C. DH
Explanation
DH (Diffie-Hellman) is a key exchange protocol that allows two parties to establish a shared secret key over an unsecured network. It does not require a pre-shared key, making it suitable for secure key exchange in scenarios where parties have not previously communicated. 3DES, AES, and MD5 are encryption algorithms, but they do not provide a secure key exchange mechanism on their own. Therefore, DH is the correct choice for secure key exchange over an unsecured network without a pre-shared key.
46.
IKE uses _______.
Correct Answer
D. All of these
Explanation
IKE (Internet Key Exchange) is a protocol used in IPsec (Internet Protocol Security) to establish a secure communication channel between two devices. It allows the devices to negotiate and exchange cryptographic keys, which are used to encrypt and authenticate the data being transmitted. Oakley, SKEME, and ISAKMP are all key exchange protocols that can be used in the IKE process. Therefore, the correct answer is "All of these" as all three protocols can be used by IKE.
47.
IPSec does not provide:
Correct Answer
C. QOS
Explanation
IPSec is a protocol suite used for securing internet communications. It provides integrity, ensuring that the data has not been tampered with during transmission, and confidentiality, encrypting the data to prevent unauthorized access. However, IPSec does not directly provide Quality of Service (QoS) mechanisms. QoS is a set of techniques used to prioritize and manage network traffic to ensure reliable and efficient delivery of data. While IPSec can work alongside QoS mechanisms, it does not inherently include QoS features itself.
48.
IKE is one of the IPSec components used to provide confidentiality and integrity:
Correct Answer
B. False
Explanation
IKE (Internet Key Exchange) is a key management protocol used in IPSec (Internet Protocol Security) to establish secure communication channels. While IPSec does provide confidentiality and integrity, IKE itself is not responsible for these functions. Instead, IKE is used to negotiate and establish the shared security parameters, such as encryption algorithms and keys, between the communicating parties. Therefore, the correct answer is false.
49.
With IPSec, transport mode is more commonly used when compared to tunnel mode as the packets are encapsulated and gateways are responsible for maintaining security association information:
Correct Answer
B. False
Explanation
In contrast to the statement, tunnel mode is more commonly used with IPSec instead of transport mode. In tunnel mode, the entire IP packet is encapsulated within another IP packet, adding an extra layer of security. This mode is often used when connecting two networks, where the gateways handle the encapsulation and security association information. Transport mode, on the other hand, only encrypts the payload of the IP packet, making it suitable for end-to-end communication within a network.
50.
Which of the below statements is false while comparing IKEv1 and IKEv2
Correct Answer
B. IKEv2 exchanges more number of messages than IKEv1
Explanation
IKEv2 exchanges fewer number of messages than IKEv1.