Below is a Certified Network Defender Certification Test! it is designed for those about to sit for the certification exam as it helps them review all the things they have learnt in class so far, are you feeling up to the task or want to see how much work you need to input into your revision, how about you take See moreup the quiz!
Usability
Data Integrity
Availability
Confidentiality
Rate this question:
255.255.255.0
18.12.4.1
172.168.12.4
169.254.254.254
Rate this question:
802.11
802.18
802.9
802.10
Rate this question:
Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review
Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk Assessment
Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk Identification
Risk Identification, Risk Assessment, Risk Monitoring & Review, Risk Treatment
Rate this question:
Confidentiality
Availability
Data Integrity
Usability
Rate this question:
Extreme severity level
Low severity level
Mid severity level
High severity level
Rate this question:
Firewall policy
Firewall log
Firewall settings
Firewall rule set
Rate this question:
Ivan settled on the private encryption method.
Ivan settled on the symmetric encryption method.
Ivan settled on the asymmetric encryption method
Ivan settled on the hashing encryption method.
Rate this question:
DMZ
Proxies
VPN
NAT
Rate this question:
802.15.4
802.15
802.12
802.16
Rate this question:
Information system
User access control
Internet usage
Confidential data
Rate this question:
PR Specialist
Attorney
Incident Handler
Evidence Manager
Rate this question:
Onsite backup
Hot site backup
Offsite backup
Cloud backup
Rate this question:
He is going to place the server in a Demilitarized Zone (DMZ)
He will put the email server in an IPsec zone.
Larry is going to put the email server in a hot-server zone.
For security reasons, Larry is going to place the email server in the company’s Logical Buffer Zone (LBZ).
Rate this question:
The IEEE standard covering wireless is 802.9 and they should follow this.
802.7 covers wireless standards and should be followed.
They should follow the 802.11 standard
Frank and the other IT employees should follow the 802.1 standard.
Rate this question:
Scans and probes
Malicious Code
Denial of service
Distributed denial of service
Rate this question:
HIPAA
ISEC
PCI DSS
SOAX
Rate this question:
Tcp.flags==0x000
Tcp.flags==0000x
Tcp.flags==000x0
Tcp.flags==x0000
Rate this question:
You should run the up2date -d -f -u command
You should run the up2data -u command
You should run the WSUS --d -f -u command.
You should type the sysupdate --d command
Physical layer
Presentation layer
Network layer
Session layer
Rate this question:
Water
Wet chemical
Dry chemical
Raw chemical
Rate this question:
HIPAA
PCI DSS
ISEC
SOX
Rate this question:
Two-factor Authentication
Smart Card Authentication
Single-sign-on
Biometric
Rate this question:
802.15
802.16
802.15.4
802.12
Rate this question:
The data link layer
The session layer
The network layer
The application and physical layers
Rate this question:
Class C
Class A
Class B
Class D
Rate this question:
RARP
ICMP
DHCP
ARP
Rate this question:
James could use PGP as a free option for encrypting the company's emails.
James should utilize the free OTP software package.
James can use MD5 algorithm to encrypt all the emails
James can enforce mandatory HTTPS in the email clients to encrypt emails
Rate this question:
They work on the session layer.
They function on either the application or the physical layer.
They function on the data link layer.
They work on the network layer
Rate this question:
Default allow
Default deny
Default restrict
Default access
Rate this question:
TCP.flags==0x000
Tcp.flags==0X029
Tcp.dstport==7
Tcp.flags==0x003
Rate this question:
Application level gateway
Circuit level gateway
Stateful Multilayer Inspection
Packet Filtering
Rate this question:
High severity level
Extreme severity level
Mid severity level
Low severity level
Rate this question:
Edit the ADLIN file.
Edit the shadow file.
Remove the /var/bin/localauth.conf file.
Edit the PAM file to enforce Windows Authentication
Rate this question:
Bastion host
Edge transport server
SOCKS hsot
Session layer firewall
Rate this question:
Archived data
Deleted data
Data in transit
Backup data
Rate this question:
She should install a mantrap
Justine needs to install a biometrics station at each entrance
Justine will need to install a revolving security door.
She should install a Thompson Trapdoor.
Rate this question:
NICs work on the Session layer of the OSI model.
The new employees should say that NICs perform on the Network layer.
They should tell Bryson that NICs perform on the Physical layer
They should answer with the Presentation layer.
Rate this question:
CBC-32
CRC-MAC
CRC-32
CBC-MAC
Rate this question:
It is a file integrity monitoring mechanism
It is a Neutral zone between a trusted network and an untrusted network
It serves as a proxy
It includes sensitive internal servers such as database servers
Rate this question:
Failure of the main node affects all other child nodes at the same level irrespective of the main node.
Does not cause any disturbance to the child nodes or its tranmission
Failure of the main node will affect all related child nodes connected to the main node
Affects the root node only
Rate this question:
Non-router based
Switch based
Hub based
Router based
Rate this question:
Pipe Model
AAA model
Hub-and-Spoke VPN model
Hose model
Rate this question:
Based on approval from management
Based on a first come first served basis
Based on a potential technical effect of the incident
Based on the type of response needed for the incident
Rate this question:
Contain the damage
Disconnect the five infected devices from the network
Inform the IRT about the incident and wait for their response
Inform everybody in the organization about the attack
Rate this question:
Normal backup
Warm backup
Hot backup
Cold backup
Rate this question:
This network-based IDS system is using anomaly detection.
This network-based IDS system is using dissimilarity algorithms.
This system is using misuse detection.
This network-based IDS is utilizing definition-based detection.
Rate this question:
External Threats
Structured Threats
Unstructured Threats
Internal Threats
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.