Certified Network Defender Certification Test! Trivia Questions Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cfernandez212
C
Cfernandez212
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,636
| Attempts: 2,640
SettingsSettings
Please wait...
  • 1/127 Questions

    An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?

    • Install a CCTV with cameras pointing to the entrance doors and the street
    • Use fences in the entrance doors
    • Use lights in all the entrance doors and along the company's perimeter
    • Use an IDS in the entrance doors and install some of them near the corners
Please wait...
About This Quiz

Below is a Certified Network Defender Certification Test! it is designed for those about to sit for the certification exam as it helps them review all the things they have learnt in class so far, are you feeling up to the task or want to see how much work you need to input into your revision, how about you take See moreup the quiz!

Certified Network Defender Certification Test! Trivia Questions Quiz - Quiz

Quiz Preview

  • 2. 

    Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user’s email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?

    • Usability

    • Data Integrity 

    • Availability

    • Confidentiality

    Correct Answer
    A. Data Integrity 
    Explanation
    Stephanie is working on data integrity. Data integrity ensures that the incoming and outgoing mail has not been modified or altered using digital signatures. It ensures that the data remains intact and unchanged during transmission.

    Rate this question:

  • 3. 

    The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.

    • 255.255.255.0

    • 18.12.4.1

    • 172.168.12.4

    • 169.254.254.254

    Correct Answer
    A. 172.168.12.4
    Explanation
    The given IP address 172.168.12.4 falls within the class B IP address range. In class B, the first two octets represent the network portion and the last two octets represent the host portion. The range of class B IP addresses is from 128.0.0.0 to 191.255.255.255. Therefore, the IP address 172.168.12.4 is within this range and is a valid class B IP address.

    Rate this question:

  • 4. 

    Which IEEE standard does wireless network use?

    • 802.11

    • 802.18

    • 802.9

    • 802.10

    Correct Answer
    A. 802.11
    Explanation
    Wireless networks use the IEEE standard 802.11. This standard specifies the protocols and technologies for wireless local area networks (WLANs). It defines the specifications for wireless communication between devices such as computers, smartphones, and routers. The 802.11 standard enables wireless connectivity and allows devices to communicate and transfer data over a wireless network.

    Rate this question:

  • 5. 

    Management decides to implement a risk management system to reduce and maintain the organization’s risk at an acceptable level. Which of the following is the correct order in the risk management phase?

    • Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review

    • Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk Assessment

    • Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk Identification

    • Risk Identification, Risk Assessment, Risk Monitoring & Review, Risk Treatment

    Correct Answer
    A. Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review
    Explanation
    The correct order in the risk management phase is as follows: first, the organization needs to identify the risks it faces. Then, it should assess the identified risks to determine their potential impact and likelihood. After that, the organization can proceed with treating the identified risks by implementing appropriate strategies to mitigate or transfer the risks. Finally, the organization should continuously monitor and review the effectiveness of the risk management system to ensure that it remains relevant and effective in reducing and maintaining the organization's risk at an acceptable level.

    Rate this question:

  • 6. 

    Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?

    • Confidentiality 

    • Availability

    • Data Integrity

    • Usability 

    Correct Answer
    A. Data Integrity
    Explanation
    Stephanie is working on ensuring the integrity of the data that is passed through email. This means she wants to make sure that the incoming and outgoing mail has not been modified or altered during transmission. By setting up digital signatures, Stephanie can verify the authenticity and integrity of the email content, ensuring that it has not been tampered with. This is important for maintaining the trustworthiness and reliability of the company's data.

    Rate this question:

  • 7. 

    Blake is working on the company’s updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

    • Extreme severity level

    • Low severity level

    • Mid severity level

    • High severity level

    Correct Answer
    A. Low severity level
    Explanation
    Unsuccessful scans and probes are categorized as low severity level incidents in the company's updated disaster and business continuity plan. This means that these incidents are considered to have a minimal impact on the company's computer and data systems. They may indicate potential security threats or vulnerabilities but do not pose an immediate or significant risk to the organization's operations.

    Rate this question:

  • 8. 

    Michael decides to view the ------------------ to track employee actions on the organization’s network.

    • Firewall policy

    • Firewall log

    • Firewall settings

    • Firewall rule set

    Correct Answer
    A. Firewall log
    Explanation
    Michael decides to view the firewall log to track employee actions on the organization's network. The firewall log is a record of all the activities and events that have been logged by the firewall. By viewing the firewall log, Michael can monitor and analyze the network traffic, identify any unauthorized access attempts or suspicious activities, and track the actions of employees on the network. This allows him to ensure the security and integrity of the organization's network and take necessary actions to mitigate any potential risks or breaches.

    Rate this question:

  • 9. 

    Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle on?

    • Ivan settled on the private encryption method.

    • Ivan settled on the symmetric encryption method.

    • Ivan settled on the asymmetric encryption method

    • Ivan settled on the hashing encryption method.

    Correct Answer
    A. Ivan settled on the asymmetric encryption method
    Explanation
    Ivan settled on the asymmetric encryption method because it involves the use of two different keys, a public key and a private key. This method is scalable, meaning it can be used for a large number of users, even though it may be slower compared to other encryption methods.

    Rate this question:

  • 10. 

    John has implemented _________ in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.

    • DMZ

    • Proxies

    • VPN

    • NAT

    Correct Answer
    A. NAT
    Explanation
    John has implemented NAT (Network Address Translation) in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique. NAT allows the organization to use private IP addresses internally and translate them to a single public IP address when communicating with external networks. This helps conserve public IP addresses and adds an extra layer of security by hiding the internal IP addresses from external sources.

    Rate this question:

  • 11. 

    ------------ is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

    • 802.15.4

    • 802.15

    • 802.12

    • 802.16

    Correct Answer
    A. 802.16
    Explanation
    802.16 is the correct answer because it is a group of broadband wireless communications standards specifically designed for Metropolitan Area Networks (MANs). This standard provides high-speed internet access and supports a wide range of applications such as voice over IP, video streaming, and data transfer. It operates in the frequency range of 10-66 GHz and offers a larger coverage area compared to other standards like 802.15.4 or 802.15, which are more suitable for short-range wireless communication. Similarly, 802.12 is not relevant as it is a standard for demand priority access method for Ethernet networks.

    Rate this question:

  • 12. 

    A company has the right to monitor the activities of their employees on different information systems according to the _________ policy.

    • Information system

    • User access control

    • Internet usage

    • Confidential data

    Correct Answer
    A. User access control
    Explanation
    A company has the right to monitor the activities of their employees on different information systems according to the user access control policy. User access control refers to the process of managing and controlling user privileges and permissions within an information system. By monitoring the activities of employees, the company can ensure that they are accessing and using the information system in a secure and appropriate manner. This helps to prevent unauthorized access, protect sensitive information, and maintain the overall security of the system.

    Rate this question:

  • 13. 

    Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation.

    • PR Specialist

    • Attorney 

    • Incident Handler

    • Evidence Manager

    Correct Answer
    A. Attorney 
    Explanation
    The company has been accused of making Harry's personal information public, and they deny these allegations. In order to defend themselves legally, they consulted an attorney for legal advice. Attorneys are trained legal professionals who can provide guidance and representation in legal matters, making them the appropriate choice for the company to seek advice from in this situation.

    Rate this question:

  • 14. 

    A company wants to implement a data backup method which allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?

    • Onsite backup

    • Hot site backup

    • Offsite backup

    • Cloud backup

    Correct Answer
    A. Cloud backup
    Explanation
    Cloud backup is the appropriate backup method that should be implemented in this scenario. Cloud backup allows the company to store and encrypt their data on remote servers, ensuring its security. It also provides the advantage of accessing the data at any time and from any location, making it a convenient and flexible solution for data backup.

    Rate this question:

  • 15. 

    Larry is responsible for the company’s network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server outside of the company’s internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls. What logical area is Larry putting the new email server into?

    • He is going to place the server in a Demilitarized Zone (DMZ)

    • He will put the email server in an IPsec zone.

    • Larry is going to put the email server in a hot-server zone.

    • For security reasons, Larry is going to place the email server in the company’s Logical Buffer Zone (LBZ).

    Correct Answer
    A. He is going to place the server in a Demilitarized Zone (DMZ)
    Explanation
    Larry is planning to place the new email server in a Demilitarized Zone (DMZ). This is a logical area that is separate from the company's internal network and is placed between two firewalls. By placing the server in the DMZ, Larry can have more control over the email while minimizing the potential security risks to the internal network. The DMZ provides an additional layer of protection by allowing only necessary traffic to access the email server, while keeping the internal network secure from any potential threats.

    Rate this question:

  • 16. 

    Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm’s partners have asked that a secure wireless network be implemented in the office so employees can move about freely without being tied to a network cable. While Frank and his colleagues are familiar with wired Ethernet technologies, 802.3, they are not familiar with how to setup wireless in a business environment. What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?

    • The IEEE standard covering wireless is 802.9 and they should follow this.

    • 802.7 covers wireless standards and should be followed.

    • They should follow the 802.11 standard

    • Frank and the other IT employees should follow the 802.1 standard.

    Correct Answer
    A. They should follow the 802.11 standard
    Explanation
    Frank and the other IT employees should follow the 802.11 standard because it is the IEEE standard that covers wireless technologies. By following this standard, they will be able to learn and understand how to set up a secure wireless network in a business environment, which is what the firm's partners have requested.

    Rate this question:

  • 17. 

    Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems are infected with a virus that forces systems to shut down automatically after period of time. What type of security incident are the employees a victim of?

    • Scans and probes

    • Malicious Code

    • Denial of service

    • Distributed denial of service

    Correct Answer
    A. Malicious Code
    Explanation
    The employees are victims of a malicious code security incident. This is indicated by the symptoms described, such as slow systems, automatic restarts, and frequent system hangs, which are all common effects of malware infections. The fact that the virus is forcing the systems to shut down automatically after a period of time further supports the conclusion that this is a malicious code incident.

    Rate this question:

  • 18. 

    A local bank wants to protect their card holder data. The bank should comply with the __________ standard to ensure the security of card holder data.

    • HIPAA

    • ISEC

    • PCI DSS

    • SOAX

    Correct Answer
    A. PCI DSS
    Explanation
    The correct answer is PCI DSS. PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards that all organizations that handle cardholder information must comply with in order to ensure the security of cardholder data. This standard helps to prevent data breaches and protect sensitive information such as credit card numbers, ensuring that the bank can safeguard their customers' data effectively.

    Rate this question:

  • 19. 

    Sam, a network administrator is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. Which filter will he use to view the traffic?

    • Tcp.flags==0x000

    • Tcp.flags==0000x

    • Tcp.flags==000x0

    • Tcp.flags==x0000

    Correct Answer
    A. Tcp.flags==0x000
    Explanation
    Sam, the network administrator, wants to detect TCP packets with no flag set to check for a specific attack attempt. To do this, he will use the filter "tcp.flags==0x000". This filter will display only the TCP packets that have all flags set to 0, indicating that no flag is set. This will help Sam identify any potential attack attempts that do not have any flags set.

    Rate this question:

  • 20. 

    The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?

    • You should run the up2date -d -f -u command

    • You should run the up2data -u command

    • You should run the WSUS --d -f -u command.

    • You should type the sysupdate --d command

    Correct Answer
    A. You should run the up2date -d -f -u command
  • 21. 

    Which OSI layer does a Network Interface Card (NIC) work on?

    • Physical layer

    • Presentation layer

    • Network layer

    • Session layer

    Correct Answer
    A. Physical layer
    Explanation
    A Network Interface Card (NIC) works on the Physical layer of the OSI model. This layer is responsible for the physical transmission of data over the network, including the physical connections, electrical signals, and encoding/decoding of data. The NIC handles tasks such as converting data into electrical signals, transmitting and receiving data packets, and managing the physical connection to the network medium.

    Rate this question:

  • 22. 

    If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

    • Water

    • Wet chemical

    • Dry chemical 

    • Raw chemical

    Correct Answer
    A. Dry chemical 
    Explanation
    Dry chemical fire suppressant is the correct answer for controlling a fire incident caused by an electrical appliance short-circuit. Dry chemical fire suppressants are effective in extinguishing electrical fires because they do not conduct electricity and can smother the flames by creating a barrier between the fire and oxygen. They also have a cooling effect, reducing the temperature of the fire. Water is not recommended for electrical fires as it conducts electricity and can potentially worsen the situation. Wet chemical and raw chemical fire suppressants may not be suitable for electrical fires as they may react with the electrical components and cause further damage.

    Rate this question:

  • 23. 

    An organization needs to adhere to the__________________ rules for safeguarding and protecting the electronically stored health information of employees.

    • HIPAA

    • PCI DSS

    • ISEC

    • SOX

    Correct Answer
    A. HIPAA
    Explanation
    HIPAA (Health Insurance Portability and Accountability Act) is a set of rules and regulations that organizations must follow to protect the electronically stored health information of their employees. HIPAA ensures the privacy and security of personal health information and sets standards for data encryption, access controls, and security measures to prevent unauthorized access or disclosure of sensitive health data. Adhering to HIPAA rules helps organizations maintain the confidentiality and integrity of employee health information and avoid legal and financial penalties.

    Rate this question:

  • 24. 

    Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the ----------------------------- authentication technique to satisfy the management request.

    • Two-factor Authentication

    • Smart Card Authentication

    • Single-sign-on

    • Biometric 

    Correct Answer
    A. Single-sign-on
    Explanation
    To satisfy the management's request of allowing employees to use the same credentials to access multiple applications, Adam should implement the single-sign-on authentication technique. Single-sign-on allows users to log in once and gain access to multiple applications without the need to re-enter their credentials for each application. This streamlines the user experience and improves productivity by reducing the need for multiple logins.

    Rate this question:

  • 25. 

    ------------ is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

    • 802.15

    • 802.16

    • 802.15.4

    • 802.12

    Correct Answer
    A. 802.16
    Explanation
    802.16 is the correct answer because it refers to a group of broadband wireless communications standards specifically designed for Metropolitan Area Networks (MANs). This standard provides high-speed internet access over a large geographical area, making it suitable for connecting multiple buildings or locations within a city or urban area. It offers improved bandwidth, range, and quality of service compared to previous standards, making it an ideal choice for MANs.

    Rate this question:

  • 26. 

    Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?

    • The data link layer

    • The session layer

    • The network layer

    • The application and physical layers

    Correct Answer
    A. The network layer
    Explanation
    IPsec VPN tunnels function on the network layer of the OSI model. The network layer is responsible for routing and forwarding data packets between different networks. IPsec, which stands for Internet Protocol Security, provides security services such as encryption and authentication at the network layer. By implementing IPsec VPN tunnels, Liza's network administrator aims to secure the communication between the branch locations and the main office at the network layer.

    Rate this question:

  • 27. 

    A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. What IP address class is the network range a part of?

    • Class C

    • Class A

    • Class B

    • Class D

    Correct Answer
    A. Class A
    Explanation
    The given IP address range of 0.0.0.0 to 127.255.255.255 falls within the Class A IP address range. Class A IP addresses have a first octet range of 1 to 126, where the first bit is always 0. In this case, the first octet is 0, which falls within the range of Class A addresses. Therefore, the network range is a part of Class A.

    Rate this question:

  • 28. 

    The --------------- protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

    • RARP

    • ICMP

    • DHCP

    • ARP

    Correct Answer
    A. ICMP
    Explanation
    ICMP (Internet Control Message Protocol) works in the network layer and is responsible for handling error codes during packet delivery. It is also responsible for providing communication in the TCP/IP stack. ICMP is used to report errors, send control messages, and diagnose network problems. It allows devices to communicate with each other and exchange information about network conditions and errors.

    Rate this question:

  • 29. 

    James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company, schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?

    • James could use PGP as a free option for encrypting the company's emails.

    • James should utilize the free OTP software package.

    • James can use MD5 algorithm to encrypt all the emails

    • James can enforce mandatory HTTPS in the email clients to encrypt emails

    Correct Answer
    A. James could use PGP as a free option for encrypting the company's emails.
    Explanation
    James should use PGP (Pretty Good Privacy) as a free option for encrypting the company's emails. PGP is a widely used encryption program that provides cryptographic privacy and authentication for data communication. It uses a combination of symmetric-key cryptography and public-key cryptography to encrypt the content of emails, ensuring that sensitive information such as social security numbers remains secure during transmission. By implementing PGP, James can protect the confidentiality of the company's email communication without incurring any additional costs.

    Rate this question:

  • 30. 

    Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?

    • They work on the session layer.

    • They function on either the application or the physical layer.

    • They function on the data link layer.

    • They work on the network layer

    Correct Answer
    A. They work on the network layer
    Explanation
    IPsec VPN tunnels function on the network layer of the OSI model. The network layer is responsible for routing and forwarding data packets between different networks. IPsec operates at this layer by encrypting and authenticating IP packets, ensuring secure communication between remote offices over the internet.

    Rate this question:

  • 31. 

    Jason has set a firewall policy that allows only a specific list of network services and deny everything else. This strategy is known as a ______________.

    • Default allow

    • Default deny

    • Default restrict

    • Default access

    Correct Answer
    A. Default deny
    Explanation
    The strategy of setting a firewall policy to allow only a specific list of network services and deny everything else is known as "Default deny". This means that by default, all network services are denied unless they are explicitly allowed in the policy.

    Rate this question:

  • 32. 

    A network administrator is monitoring the network traffic with Wireshark. Which of the following filters will she use to view the packets moving without setting a flag to detect TCP Null Scan attempts?

    • TCP.flags==0x000

    • Tcp.flags==0X029

    • Tcp.dstport==7

    • Tcp.flags==0x003

    Correct Answer
    A. TCP.flags==0x000
    Explanation
    The correct answer is "TCP.flags==0x000". This filter will allow the network administrator to view packets that have a TCP flag value of 0x000, which indicates that no flags are set. By monitoring these packets, the administrator can detect TCP Null Scan attempts, which are a type of network scanning technique used to gather information about a target system without sending any data.

    Rate this question:

  • 33. 

    John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?

    • Application level gateway

    • Circuit level gateway

    • Stateful Multilayer Inspection

    • Packet Filtering

    Correct Answer
    A. Circuit level gateway
    Explanation
    John is thinking of implementing a Circuit level gateway as his firewall service. A Circuit level gateway operates at the session layer of the OSI model, which allows it to monitor and control the connections between two networks. It can hide the private network information by creating a separate circuit for each connection and only allowing authorized traffic to pass through. This type of firewall service provides a higher level of security and control compared to other options such as packet filtering.

    Rate this question:

  • 34. 

    Blake is working on the company’s updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

    • High severity level

    • Extreme severity level

    • Mid severity level

    • Low severity level

    Correct Answer
    A. Low severity level
    Explanation
    Unsuccessful scans and probes are categorized as low severity level incidents in the company's updated disaster and business continuity plan. This means that these incidents are considered to have a lower impact or potential risk compared to other types of incidents. The plan likely prioritizes and allocates resources accordingly based on the severity level, with low severity incidents requiring less immediate attention and resources compared to higher severity incidents.

    Rate this question:

  • 35. 

    According to the company’s security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?

    • Edit the ADLIN file.

    • Edit the shadow file.

    • Remove the /var/bin/localauth.conf file.

    • Edit the PAM file to enforce Windows Authentication

    Correct Answer
    A. Edit the PAM file to enforce Windows Authentication
    Explanation
    To force the Linux server to use Windows Authentication, the PAM (Pluggable Authentication Modules) file needs to be edited. PAM is a system that provides a flexible and modular framework for authentication in Linux systems. By editing the PAM file, the necessary configuration can be made to enforce Windows Authentication, aligning with the company's security policy.

    Rate this question:

  • 36. 

    Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?

    • Bastion host

    • Edge transport server

    • SOCKS hsot

    • Session layer firewall

    Correct Answer
    A. Bastion host
    Explanation
    Based on the given information, the server that Paul has set up acts as a proxy, limits services, and filters packets. This aligns with the characteristics of a bastion host. A bastion host is a server that is exposed to the public network and is heavily fortified and secured to protect the internal network from external threats. It acts as a gateway and provides a controlled entry point into the private network. Therefore, the correct answer is "Bastion host".

    Rate this question:

  • 37. 

    George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the ____________.

    • Archived data

    • Deleted data

    • Data in transit

    • Backup data

    Correct Answer
    A. Backup data
    Explanation
    Recovery drill tests are conducted on backup data. This is because backup data is a copy of the original data that is stored separately and can be used to restore or recover the system in case of any failure or data loss. Conducting recovery drill tests on backup data helps to ensure that the backup system is working properly and the data can be successfully restored when needed.

    Rate this question:

  • 38. 

    Justine has been tasked by her supervisor to ensure that the company’s physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?

    • She should install a mantrap

    • Justine needs to install a biometrics station at each entrance

    • Justine will need to install a revolving security door.

    • She should install a Thompson Trapdoor.

    Correct Answer
    A. She should install a mantrap
    Explanation
    A mantrap is a physical security measure that consists of an enclosed space with two or more doors. Only one door can be open at a time, preventing unauthorized individuals from entering or exiting without proper authorization. By installing a mantrap, Justine can effectively prevent piggybacking, as each person must be verified before being allowed access to the next area. This ensures that only authorized individuals can enter the premises, enhancing the company's physical security measures.

    Rate this question:

  • 39. 

    Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What should the new employees answer?

    • NICs work on the Session layer of the OSI model.

    • The new employees should say that NICs perform on the Network layer.

    • They should tell Bryson that NICs perform on the Physical layer

    • They should answer with the Presentation layer.

    Correct Answer
    A. They should tell Bryson that NICs perform on the Physical layer
    Explanation
    NICs (Network Interface Cards) are responsible for connecting a computer to a network. In the OSI model, the Physical layer is the lowest layer and is concerned with the physical transmission of data. Since NICs are responsible for transmitting and receiving data signals at the physical level, the new employees should answer that NICs perform on the Physical layer.

    Rate this question:

  • 40. 

    As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2’s ____________integrity check mechanism provides security against a replay attack

    • CBC-32

    • CRC-MAC

    • CRC-32

    • CBC-MAC

    Correct Answer
    A. CBC-MAC
    Explanation
    The correct answer is CBC-MAC. CBC-MAC stands for Cipher Block Chaining Message Authentication Code. It is an integrity check mechanism used in WPA2 encryption to provide security against replay attacks. CBC-MAC combines the encryption and authentication processes, ensuring that the data has not been tampered with or replayed during transmission. This mechanism adds an extra layer of security to the wireless network by verifying the integrity of the transmitted data.

    Rate this question:

  • 41. 

    Identify the correct statements regarding a DMZ zone:

    • It is a file integrity monitoring mechanism

    • It is a Neutral zone between a trusted network and an untrusted network 

    • It serves as a proxy

    • It includes sensitive internal servers such as database servers

    Correct Answer
    A. It is a Neutral zone between a trusted network and an untrusted network 
    Explanation
    A DMZ zone is a neutral zone between a trusted network and an untrusted network. It is designed to provide an additional layer of security by separating sensitive internal servers, such as database servers, from the external network. It acts as a buffer zone, allowing limited access to the internal network while protecting it from potential threats originating from the untrusted network. A DMZ zone is not a file integrity monitoring mechanism or a proxy.

    Rate this question:

  • 42. 

    Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any one of the main nodes fail?

    • Failure of the main node affects all other child nodes at the same level irrespective of the main node.

    • Does not cause any disturbance to the child nodes or its tranmission

    • Failure of the main node will affect all related child nodes connected to the main node

    • Affects the root node only

    Correct Answer
    A. Failure of the main node will affect all related child nodes connected to the main node
    Explanation
    If any one of the main nodes in the tree network fails, it will affect all related child nodes connected to that main node. This means that if N1 or N2 fails, it will also affect N11, N12, N21, and N22. The failure of the main node will disrupt the communication and transmission between the root node and its child nodes connected to that main node.

    Rate this question:

  • 43. 

    Which of the following network monitoring techniques requires extra monitoring software or hardware?

    • Non-router based

    • Switch based 

    • Hub based 

    • Router based

    Correct Answer
    A. Non-router based
    Explanation
    Non-router based network monitoring techniques require extra monitoring software or hardware because routers are already equipped with built-in monitoring capabilities. Non-router based techniques, such as using a separate monitoring device or software, are necessary to monitor network traffic, analyze data, and identify any issues or anomalies in the network. This additional software or hardware is required to capture and analyze network packets, monitor bandwidth usage, and detect any security threats or performance issues.

    Rate this question:

  • 44. 

    Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

    • Pipe Model

    • AAA model

    • Hub-and-Spoke VPN model

    • Hose model

    Correct Answer
    A. Pipe Model
    Explanation
    The Pipe Model is the correct answer because it guarantees the traffic from one customer edge (CE) to another. In this model, the VPN provider ensures that the traffic flows through a dedicated and secure "pipe" from one CE device to another, without interference or congestion from other traffic. This model is ideal for organizations that require high levels of reliability and performance for their VPN connections.

    Rate this question:

  • 45. 

    Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is a problem connecting to the main server. How will you prioritize these two incidents?

    • Based on approval from management

    • Based on a first come first served basis

    • Based on a potential technical effect of the incident

    • Based on the type of response needed for the incident

    Correct Answer
    A. Based on a potential technical effect of the incident
    Explanation
    The correct answer is based on a potential technical effect of the incident. In this scenario, prioritizing incidents based on the potential technical effect allows the network administrator to address the most critical issue first. The inability to log in to a system may indicate a localized issue affecting only one employee, while a problem connecting to the main server could potentially impact multiple users or even the entire network. By addressing the main server issue first, the network administrator can ensure that the system is up and running for all users before addressing individual login issues.

    Rate this question:

  • 46. 

    Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?

    • Contain the damage

    • Disconnect the five infected devices from the network

    • Inform the IRT about the incident and wait for their response

    • Inform everybody in the organization about the attack

    Correct Answer
    A. Inform the IRT about the incident and wait for their response
    Explanation
    Kyle's first course of action should be to inform the IRT (Incident Response Team) about the suspected Trojan infection on his computer. The IRT is specifically trained to handle and respond to security incidents, and they have the expertise to assess the situation, investigate the extent of the infection, and take appropriate actions to mitigate the damage. By informing the IRT, Kyle can ensure that the incident is handled by professionals who can provide guidance and support in dealing with the incident effectively. Waiting for their response allows for a coordinated and systematic approach to resolving the issue.

    Rate this question:

  • 47. 

    Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?

    • Normal backup

    • Warm backup

    • Hot backup

    • Cold backup

    Correct Answer
    A. Hot backup
    Explanation
    Henry will select the hot backup method because it ensures no service level downtime. Hot backup involves creating a duplicate copy of the entire system while it is still running and actively serving users. This allows for continuous operations and minimal disruption in case of a failure or disaster. By keeping the backup system up-to-date in real-time, Henry can quickly switch to the backup system without any noticeable downtime or impact on the organization's services.

    Rate this question:

  • 48. 

    Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS. What type of detection is this network-based IDS system using?

    • This network-based IDS system is using anomaly detection.

    • This network-based IDS system is using dissimilarity algorithms.

    • This system is using misuse detection.

    • This network-based IDS is utilizing definition-based detection.

    Correct Answer
    A. This network-based IDS system is using anomaly detection.
    Explanation
    The network-based IDS system is using anomaly detection. This type of detection involves identifying abnormal behavior and patterns in network traffic that are different from the normal traffic recorded by the IDS. By detecting these anomalies, the system can identify potential security threats or attacks.

    Rate this question:

  • 49. 

    If a network is at risk from unskilled individuals, what type of threat is this?

    • External Threats

    • Structured Threats

    • Unstructured Threats

    • Internal Threats

    Correct Answer
    A. Unstructured Threats
    Explanation
    Unstructured threats refer to threats posed by unskilled individuals who may not have specific knowledge or expertise in hacking or attacking computer networks. These individuals may engage in activities that can unintentionally or unknowingly compromise the security of a network, such as clicking on malicious links or downloading infected files. Therefore, if a network is at risk from unskilled individuals, it can be categorized as an unstructured threat.

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 14, 2019
    Quiz Created by
    Cfernandez212
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.