Certified Network Defender Certification Test! Trivia Questions Quiz

127 Questions | Total Attempts: 1949

SettingsSettingsSettings
Certified Network Defender Certification Test! Trivia Questions Quiz - Quiz

Below is a Certified Network Defender Certification Test! it is designed for those about to sit for the certification exam as it helps them review all the things they have learnt in class so far, are you feeling up to the task or want to see how much work you need to input into your revision, how about you take up the quiz!


Questions and Answers
  • 1. 
    Management decides to implement a risk management system to reduce and maintain the organization’s risk at an acceptable level. Which of the following is the correct order in the risk management phase?
    • A. 

      Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review

    • B. 

      Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk Assessment

    • C. 

      Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk Identification

    • D. 

      Risk Identification, Risk Assessment, Risk Monitoring & Review, Risk Treatment

  • 2. 
    John has implemented _________ in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.
    • A. 

      DMZ

    • B. 

      Proxies

    • C. 

      VPN

    • D. 

      NAT

  • 3. 
    What command is used to terminate certain processes in an Ubuntu system?
    • A. 

      #grep Kill [Target Process}

    • B. 

      #kill -9 [PID]

    • C. 

      #ps ax Kill

    • D. 

      # netstat Kill [Target Process]

  • 4. 
    Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any one of the main nodes fail?
    • A. 

      Failure of the main node affects all other child nodes at the same level irrespective of the main node.

    • B. 

      Does not cause any disturbance to the child nodes or its tranmission

    • C. 

      Failure of the main node will affect all related child nodes connected to the main node

    • D. 

      Affects the root node only

  • 5. 
    Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?
    • A. 

      Confidentiality 

    • B. 

      Availability

    • C. 

      Data Integrity

    • D. 

      Usability 

  • 6. 
    An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?
    • A. 

      Install a CCTV with cameras pointing to the entrance doors and the street

    • B. 

      Use fences in the entrance doors

    • C. 

      Use lights in all the entrance doors and along the company's perimeter

    • D. 

      Use an IDS in the entrance doors and install some of them near the corners

  • 7. 
    Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems are infected with a virus that forces systems to shut down automatically after period of time. What type of security incident are the employees a victim of?
    • A. 

      Scans and probes

    • B. 

      Malicious Code

    • C. 

      Denial of service

    • D. 

      Distributed denial of service

  • 8. 
    ------------ is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)
    • A. 

      802.15.4

    • B. 

      802.15

    • C. 

      802.12

    • D. 

      802.16

  • 9. 
    The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.
    • A. 

      255.255.255.0

    • B. 

      18.12.4.1

    • C. 

      172.168.12.4

    • D. 

      169.254.254.254

  • 10. 
    Rick has implemented several firewalls and IDS systems across his enterprise network. What should he do to effectively correlate all incidents that pass through these security controls?
    • A. 

      Use firewalls in Network Address Transition (NAT) mode

    • B. 

      Implement IPsec

    • C. 

      Implement Simple Network Management Protocol (SNMP)

    • D. 

      Use Network Time Protocol (NTP)

  • 11. 
    Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium?
    • A. 

      Capability

    • B. 

      Accountability

    • C. 

      Extensibility 

    • D. 

      Reliability 

  • 12. 
    Which of the following network monitoring techniques requires extra monitoring software or hardware?
    • A. 

      Non-router based

    • B. 

      Switch based 

    • C. 

      Hub based 

    • D. 

      Router based

  • 13. 
    Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?
    • A. 

      Steven should use a Demilitarized Zone (DMZ)

    • B. 

      Steven should use Open Shortest Path First (OSPF)

    • C. 

      Steven should use IPsec

    • D. 

      Steven should enabled Network Address Translation(NAT)

  • 14. 
    What is the name of the authority that verifies the certificate authority in digital certificates?
    • A. 

      Directory management system

    • B. 

      Certificate authority 

    • C. 

      Registration authority 

    • D. 

      Certificate Management system

  • 15. 
    Will is working as a Network Administrator. Management wants to maintain a backup of all the company data as soon as it starts operations. They decided to use a RAID backup storage technology for their data backup plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data written to one disk is copied automatically to the other disk as well. This maintains an additional copy of the data. Which RAID level is used here?
    • A. 

      RAID 3

    • B. 

      RAID 1

    • C. 

      RAID 5

    • D. 

      RAID 0

  • 16. 
    You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the network. What will be your first reaction as a first responder?
    • A. 

      Avoid Fear, Uncertainty and Doubt

    • B. 

      Communicate the incident 

    • C. 

      Make an initial assessment 

    • D. 

      Disable Virus Protection

  • 17. 
    If a network is at risk from unskilled individuals, what type of threat is this?
    • A. 

      External Threats

    • B. 

      Structured Threats

    • C. 

      Unstructured Threats

    • D. 

      Internal Threats

  • 18. 
    According to the company’s security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?
    • A. 

      Edit the ADLIN file.

    • B. 

      Edit the shadow file.

    • C. 

      Remove the /var/bin/localauth.conf file.

    • D. 

      Edit the PAM file to enforce Windows Authentication

  • 19. 
    Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type of backup is Kelly using?
    • A. 

      Full backup

    • B. 

      Incremental backup

    • C. 

      Differential Backup

    • D. 

      Normal Backup

  • 20. 
    John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?
    • A. 

      Tcp.flags==0x2b

    • B. 

      Tcp.flags=0x00

    • C. 

      Tcp.options.mss_val<1460

    • D. 

      Tcp.options.wscale_val==20

  • 21. 
    A company has the right to monitor the activities of their employees on different information systems according to the _________ policy.
    • A. 

      Information system

    • B. 

      User access control

    • C. 

      Internet usage

    • D. 

      Confidential data

  • 22. 
    Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?
    • A. 

      The data link layer

    • B. 

      The session layer

    • C. 

      The network layer

    • D. 

      The application and physical layers

  • 23. 
    Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?
    • A. 

      Assign eradication.

    • B. 

      Recovery

    • C. 

      Containment

    • D. 

      A follow-up.

  • 24. 
    Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?
    • A. 

      Pipe Model

    • B. 

      AAA model

    • C. 

      Hub-and-Spoke VPN model

    • D. 

      Hose model

  • 25. 
    James was inspecting ARP packets in his organization’s network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?
    • A. 

      ARP Sweep

    • B. 

      ARP misconfiguration 

    • C. 

      ARP spoofing

    • D. 

      ARP Poisioning 

Back to Top Back to top