Certified Network Defender Certification Test! Trivia Questions Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cfernandez212
C
Cfernandez212
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,642
| Attempts: 2,642 | Questions: 127
Please wait...
Question 1 / 127
0 %
0/100
Score 0/100
1. Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?

Explanation

Stephanie is working on data integrity. Data integrity ensures that the incoming and outgoing mail has not been modified or altered using digital signatures. It ensures that the data remains intact and unchanged during transmission.

Submit
Please wait...
About This Quiz
Certified Network Defender Certification Test! Trivia Questions Quiz - Quiz

Below is a Certified Network Defender Certification Test! it is designed for those about to sit for the certification exam as it helps them review all the things they have learnt in class so far, are you feeling up to the task or want to see how much work you... see moreneed to input into your revision, how about you take up the quiz! see less

Personalize your quiz and earn a certificate with your name on it!
2. An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?

Explanation

Installing a CCTV with cameras pointing to the entrance doors and the street is the best option to monitor the physical perimeter and entrance doors 24 hours. This option allows for continuous surveillance and provides visual evidence in case of any security incidents. It also covers both the entrance doors and the street, ensuring comprehensive monitoring of the surroundings. Using fences or lights may provide some level of security, but they do not offer the same level of monitoring and evidence collection as a CCTV system. Installing an IDS near the corners may help detect intrusions, but it does not provide visual surveillance of the entire area.

Submit
3. The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.

Explanation

The given IP address 172.168.12.4 falls within the class B IP address range. In class B, the first two octets represent the network portion and the last two octets represent the host portion. The range of class B IP addresses is from 128.0.0.0 to 191.255.255.255. Therefore, the IP address 172.168.12.4 is within this range and is a valid class B IP address.

Submit
4. Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle on?

Explanation

Ivan settled on the asymmetric encryption method because it involves the use of two different keys, a public key and a private key. This method is scalable, meaning it can be used for a large number of users, even though it may be slower compared to other encryption methods.

Submit
5. Which IEEE standard does wireless network use?

Explanation

Wireless networks use the IEEE standard 802.11. This standard specifies the protocols and technologies for wireless local area networks (WLANs). It defines the specifications for wireless communication between devices such as computers, smartphones, and routers. The 802.11 standard enables wireless connectivity and allows devices to communicate and transfer data over a wireless network.

Submit
6. Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?

Explanation

The correct order in the risk management phase is as follows: first, the organization needs to identify the risks it faces. Then, it should assess the identified risks to determine their potential impact and likelihood. After that, the organization can proceed with treating the identified risks by implementing appropriate strategies to mitigate or transfer the risks. Finally, the organization should continuously monitor and review the effectiveness of the risk management system to ensure that it remains relevant and effective in reducing and maintaining the organization's risk at an acceptable level.

Submit
7. Michael decides to view the ------------------ to track employee actions on the organization's network.

Explanation

Michael decides to view the firewall log to track employee actions on the organization's network. The firewall log is a record of all the activities and events that have been logged by the firewall. By viewing the firewall log, Michael can monitor and analyze the network traffic, identify any unauthorized access attempts or suspicious activities, and track the actions of employees on the network. This allows him to ensure the security and integrity of the organization's network and take necessary actions to mitigate any potential risks or breaches.

Submit
8. Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

Explanation

Unsuccessful scans and probes are categorized as low severity level incidents in the company's updated disaster and business continuity plan. This means that these incidents are considered to have a minimal impact on the company's computer and data systems. They may indicate potential security threats or vulnerabilities but do not pose an immediate or significant risk to the organization's operations.

Submit
9. Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?

Explanation

Stephanie is working on ensuring the integrity of the data that is passed through email. This means she wants to make sure that the incoming and outgoing mail has not been modified or altered during transmission. By setting up digital signatures, Stephanie can verify the authenticity and integrity of the email content, ensuring that it has not been tampered with. This is important for maintaining the trustworthiness and reliability of the company's data.

Submit
10. A company has the right to monitor the activities of their employees on different information systems according to the _________ policy.

Explanation

A company has the right to monitor the activities of their employees on different information systems according to the user access control policy. User access control refers to the process of managing and controlling user privileges and permissions within an information system. By monitoring the activities of employees, the company can ensure that they are accessing and using the information system in a secure and appropriate manner. This helps to prevent unauthorized access, protect sensitive information, and maintain the overall security of the system.

Submit
11. A company wants to implement a data backup method which allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?

Explanation

Cloud backup is the appropriate backup method that should be implemented in this scenario. Cloud backup allows the company to store and encrypt their data on remote servers, ensuring its security. It also provides the advantage of accessing the data at any time and from any location, making it a convenient and flexible solution for data backup.

Submit
12. John has implemented _________ in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.

Explanation

John has implemented NAT (Network Address Translation) in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique. NAT allows the organization to use private IP addresses internally and translate them to a single public IP address when communicating with external networks. This helps conserve public IP addresses and adds an extra layer of security by hiding the internal IP addresses from external sources.

Submit
13. ------------ is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

Explanation

802.16 is the correct answer because it is a group of broadband wireless communications standards specifically designed for Metropolitan Area Networks (MANs). This standard provides high-speed internet access and supports a wide range of applications such as voice over IP, video streaming, and data transfer. It operates in the frequency range of 10-66 GHz and offers a larger coverage area compared to other standards like 802.15.4 or 802.15, which are more suitable for short-range wireless communication. Similarly, 802.12 is not relevant as it is a standard for demand priority access method for Ethernet networks.

Submit
14. Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal advice to defend them against this allegation.

Explanation

The company has been accused of making Harry's personal information public, and they deny these allegations. In order to defend themselves legally, they consulted an attorney for legal advice. Attorneys are trained legal professionals who can provide guidance and representation in legal matters, making them the appropriate choice for the company to seek advice from in this situation.

Submit
15. Larry is responsible for the company's network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls. What logical area is Larry putting the new email server into?

Explanation

Larry is planning to place the new email server in a Demilitarized Zone (DMZ). This is a logical area that is separate from the company's internal network and is placed between two firewalls. By placing the server in the DMZ, Larry can have more control over the email while minimizing the potential security risks to the internal network. The DMZ provides an additional layer of protection by allowing only necessary traffic to access the email server, while keeping the internal network secure from any potential threats.

Submit
16. Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems are infected with a virus that forces systems to shut down automatically after period of time. What type of security incident are the employees a victim of?

Explanation

The employees are victims of a malicious code security incident. This is indicated by the symptoms described, such as slow systems, automatic restarts, and frequent system hangs, which are all common effects of malware infections. The fact that the virus is forcing the systems to shut down automatically after a period of time further supports the conclusion that this is a malicious code incident.

Submit
17. ------------ is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

Explanation

802.16 is the correct answer because it refers to a group of broadband wireless communications standards specifically designed for Metropolitan Area Networks (MANs). This standard provides high-speed internet access over a large geographical area, making it suitable for connecting multiple buildings or locations within a city or urban area. It offers improved bandwidth, range, and quality of service compared to previous standards, making it an ideal choice for MANs.

Submit
18. If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

Explanation

Dry chemical fire suppressant is the correct answer for controlling a fire incident caused by an electrical appliance short-circuit. Dry chemical fire suppressants are effective in extinguishing electrical fires because they do not conduct electricity and can smother the flames by creating a barrier between the fire and oxygen. They also have a cooling effect, reducing the temperature of the fire. Water is not recommended for electrical fires as it conducts electricity and can potentially worsen the situation. Wet chemical and raw chemical fire suppressants may not be suitable for electrical fires as they may react with the electrical components and cause further damage.

Submit
19. Which OSI layer does a Network Interface Card (NIC) work on?

Explanation

A Network Interface Card (NIC) works on the Physical layer of the OSI model. This layer is responsible for the physical transmission of data over the network, including the physical connections, electrical signals, and encoding/decoding of data. The NIC handles tasks such as converting data into electrical signals, transmitting and receiving data packets, and managing the physical connection to the network medium.

Submit
20. Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely without being tied to a network cable. While Frank and his colleagues are familiar with wired Ethernet technologies, 802.3, they are not familiar with how to setup wireless in a business environment. What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?

Explanation

Frank and the other IT employees should follow the 802.11 standard because it is the IEEE standard that covers wireless technologies. By following this standard, they will be able to learn and understand how to set up a secure wireless network in a business environment, which is what the firm's partners have requested.

Submit
21. A local bank wants to protect their card holder data. The bank should comply with the __________ standard to ensure the security of card holder data.

Explanation

The correct answer is PCI DSS. PCI DSS stands for Payment Card Industry Data Security Standard. It is a set of security standards that all organizations that handle cardholder information must comply with in order to ensure the security of cardholder data. This standard helps to prevent data breaches and protect sensitive information such as credit card numbers, ensuring that the bank can safeguard their customers' data effectively.

Submit
22. A network administrator is monitoring the network traffic with Wireshark. Which of the following filters will she use to view the packets moving without setting a flag to detect TCP Null Scan attempts?

Explanation

The correct answer is "TCP.flags==0x000". This filter will allow the network administrator to view packets that have a TCP flag value of 0x000, which indicates that no flags are set. By monitoring these packets, the administrator can detect TCP Null Scan attempts, which are a type of network scanning technique used to gather information about a target system without sending any data.

Submit
23. An organization needs to adhere to the__________________ rules for safeguarding and protecting the electronically stored health information of employees.  

Explanation

HIPAA (Health Insurance Portability and Accountability Act) is a set of rules and regulations that organizations must follow to protect the electronically stored health information of their employees. HIPAA ensures the privacy and security of personal health information and sets standards for data encryption, access controls, and security measures to prevent unauthorized access or disclosure of sensitive health data. Adhering to HIPAA rules helps organizations maintain the confidentiality and integrity of employee health information and avoid legal and financial penalties.

Submit
24. Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the ----------------------------- authentication technique to satisfy the management request.

Explanation

To satisfy the management's request of allowing employees to use the same credentials to access multiple applications, Adam should implement the single-sign-on authentication technique. Single-sign-on allows users to log in once and gain access to multiple applications without the need to re-enter their credentials for each application. This streamlines the user experience and improves productivity by reducing the need for multiple logins.

Submit
25. The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?

Explanation

not-available-via-ai

Submit
26. Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

Explanation

Unsuccessful scans and probes are categorized as low severity level incidents in the company's updated disaster and business continuity plan. This means that these incidents are considered to have a lower impact or potential risk compared to other types of incidents. The plan likely prioritizes and allocates resources accordingly based on the severity level, with low severity incidents requiring less immediate attention and resources compared to higher severity incidents.

Submit
27. James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company, schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?

Explanation

James should use PGP (Pretty Good Privacy) as a free option for encrypting the company's emails. PGP is a widely used encryption program that provides cryptographic privacy and authentication for data communication. It uses a combination of symmetric-key cryptography and public-key cryptography to encrypt the content of emails, ensuring that sensitive information such as social security numbers remains secure during transmission. By implementing PGP, James can protect the confidentiality of the company's email communication without incurring any additional costs.

Submit
28. Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?

Explanation

IPsec VPN tunnels function on the network layer of the OSI model. The network layer is responsible for routing and forwarding data packets between different networks. IPsec, which stands for Internet Protocol Security, provides security services such as encryption and authentication at the network layer. By implementing IPsec VPN tunnels, Liza's network administrator aims to secure the communication between the branch locations and the main office at the network layer.

Submit
29. Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?

Explanation

IPsec VPN tunnels function on the network layer of the OSI model. The network layer is responsible for routing and forwarding data packets between different networks. IPsec operates at this layer by encrypting and authenticating IP packets, ensuring secure communication between remote offices over the internet.

Submit
30. George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the ____________.

Explanation

Recovery drill tests are conducted on backup data. This is because backup data is a copy of the original data that is stored separately and can be used to restore or recover the system in case of any failure or data loss. Conducting recovery drill tests on backup data helps to ensure that the backup system is working properly and the data can be successfully restored when needed.

Submit
31. Sam, a network administrator is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. Which filter will he use to view the traffic?

Explanation

Sam, the network administrator, wants to detect TCP packets with no flag set to check for a specific attack attempt. To do this, he will use the filter "tcp.flags==0x000". This filter will display only the TCP packets that have all flags set to 0, indicating that no flag is set. This will help Sam identify any potential attack attempts that do not have any flags set.

Submit
32. The --------------- protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

Explanation

ICMP (Internet Control Message Protocol) works in the network layer and is responsible for handling error codes during packet delivery. It is also responsible for providing communication in the TCP/IP stack. ICMP is used to report errors, send control messages, and diagnose network problems. It allows devices to communicate with each other and exchange information about network conditions and errors.

Submit
33. John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?

Explanation

John is thinking of implementing a Circuit level gateway as his firewall service. A Circuit level gateway operates at the session layer of the OSI model, which allows it to monitor and control the connections between two networks. It can hide the private network information by creating a separate circuit for each connection and only allowing authorized traffic to pass through. This type of firewall service provides a higher level of security and control compared to other options such as packet filtering.

Submit
34. According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?

Explanation

To force the Linux server to use Windows Authentication, the PAM (Pluggable Authentication Modules) file needs to be edited. PAM is a system that provides a flexible and modular framework for authentication in Linux systems. By editing the PAM file, the necessary configuration can be made to enforce Windows Authentication, aligning with the company's security policy.

Submit
35. As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ____________integrity check mechanism provides security against a replay attack

Explanation

The correct answer is CBC-MAC. CBC-MAC stands for Cipher Block Chaining Message Authentication Code. It is an integrity check mechanism used in WPA2 encryption to provide security against replay attacks. CBC-MAC combines the encryption and authentication processes, ensuring that the data has not been tampered with or replayed during transmission. This mechanism adds an extra layer of security to the wireless network by verifying the integrity of the transmitted data.

Submit
36. Identify the correct statements regarding a DMZ zone:

Explanation

A DMZ zone is a neutral zone between a trusted network and an untrusted network. It is designed to provide an additional layer of security by separating sensitive internal servers, such as database servers, from the external network. It acts as a buffer zone, allowing limited access to the internal network while protecting it from potential threats originating from the untrusted network. A DMZ zone is not a file integrity monitoring mechanism or a proxy.

Submit
37. Jason has set a firewall policy that allows only a specific list of network services and deny everything else. This strategy is known as a ______________.

Explanation

The strategy of setting a firewall policy to allow only a specific list of network services and deny everything else is known as "Default deny". This means that by default, all network services are denied unless they are explicitly allowed in the policy.

Submit
38. Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?

Explanation

Based on the given information, the server that Paul has set up acts as a proxy, limits services, and filters packets. This aligns with the characteristics of a bastion host. A bastion host is a server that is exposed to the public network and is heavily fortified and secured to protect the internal network from external threats. It acts as a gateway and provides a controlled entry point into the private network. Therefore, the correct answer is "Bastion host".

Submit
39. A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. What IP address class is the network range a part of?

Explanation

The given IP address range of 0.0.0.0 to 127.255.255.255 falls within the Class A IP address range. Class A IP addresses have a first octet range of 1 to 126, where the first bit is always 0. In this case, the first octet is 0, which falls within the range of Class A addresses. Therefore, the network range is a part of Class A.

Submit
40. Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

Explanation

The Pipe Model is the correct answer because it guarantees the traffic from one customer edge (CE) to another. In this model, the VPN provider ensures that the traffic flows through a dedicated and secure "pipe" from one CE device to another, without interference or congestion from other traffic. This model is ideal for organizations that require high levels of reliability and performance for their VPN connections.

Submit
41. Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?

Explanation

Kyle's first course of action should be to inform the IRT (Incident Response Team) about the suspected Trojan infection on his computer. The IRT is specifically trained to handle and respond to security incidents, and they have the expertise to assess the situation, investigate the extent of the infection, and take appropriate actions to mitigate the damage. By informing the IRT, Kyle can ensure that the incident is handled by professionals who can provide guidance and support in dealing with the incident effectively. Waiting for their response allows for a coordinated and systematic approach to resolving the issue.

Submit
42. Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS. What type of detection is this network-based IDS system using?

Explanation

The network-based IDS system is using anomaly detection. This type of detection involves identifying abnormal behavior and patterns in network traffic that are different from the normal traffic recorded by the IDS. By detecting these anomalies, the system can identify potential security threats or attacks.

Submit
43. Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?

Explanation

A mantrap is a physical security measure that consists of an enclosed space with two or more doors. Only one door can be open at a time, preventing unauthorized individuals from entering or exiting without proper authorization. By installing a mantrap, Justine can effectively prevent piggybacking, as each person must be verified before being allowed access to the next area. This ensures that only authorized individuals can enter the premises, enhancing the company's physical security measures.

Submit
44. Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any one of the main nodes fail?

Explanation

If any one of the main nodes in the tree network fails, it will affect all related child nodes connected to that main node. This means that if N1 or N2 fails, it will also affect N11, N12, N21, and N22. The failure of the main node will disrupt the communication and transmission between the root node and its child nodes connected to that main node.

Submit
45. Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What should the new employees answer?

Explanation

NICs (Network Interface Cards) are responsible for connecting a computer to a network. In the OSI model, the Physical layer is the lowest layer and is concerned with the physical transmission of data. Since NICs are responsible for transmitting and receiving data signals at the physical level, the new employees should answer that NICs perform on the Physical layer.

Submit
46. Which of the following network monitoring techniques requires extra monitoring software or hardware?

Explanation

Non-router based network monitoring techniques require extra monitoring software or hardware because routers are already equipped with built-in monitoring capabilities. Non-router based techniques, such as using a separate monitoring device or software, are necessary to monitor network traffic, analyze data, and identify any issues or anomalies in the network. This additional software or hardware is required to capture and analyze network packets, monitor bandwidth usage, and detect any security threats or performance issues.

Submit
47. Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?

Explanation

Simon and his administrators can implement Tripwire to accomplish their goal of monitoring the network for critical and essential file changes. Tripwire is a file integrity monitoring tool that detects any unauthorized changes made to files on a system. By implementing Tripwire, the administrators will be alerted whenever a critical file is altered, allowing them to take immediate action and prevent any further unauthorized access or modifications to the network.

Submit
48. Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is a problem connecting to the main server. How will you prioritize these two incidents?

Explanation

The correct answer is based on a potential technical effect of the incident. In this scenario, prioritizing incidents based on the potential technical effect allows the network administrator to address the most critical issue first. The inability to log in to a system may indicate a localized issue affecting only one employee, while a problem connecting to the main server could potentially impact multiple users or even the entire network. By addressing the main server issue first, the network administrator can ensure that the system is up and running for all users before addressing individual login issues.

Submit
49. Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _________ as it seperates the storage units from the servers and the user network.

Explanation

Timothy decides to implement a dedicated network for sharing storage resources. He uses a SAN (Storage Area Network) as it separates the storage units from the servers and the user network. SANs are widely used in organizations to provide high-speed, reliable, and centralized storage solutions. By implementing a SAN, Timothy can efficiently manage and allocate storage resources, improve data access and availability, and ensure better performance and scalability for the organization's storage infrastructure.

Submit
50. Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?

Explanation

Henry will select the hot backup method because it ensures no service level downtime. Hot backup involves creating a duplicate copy of the entire system while it is still running and actively serving users. This allows for continuous operations and minimal disruption in case of a failure or disaster. By keeping the backup system up-to-date in real-time, Henry can quickly switch to the backup system without any noticeable downtime or impact on the organization's services.

Submit
51. John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?

Explanation

John is thinking of implementing a Circuit level gateway firewall service. This type of firewall operates at the session layer of the OSI model and has the ability to hide the private network information. It works by creating a circuit between the internal and external networks, allowing only authorized connections to pass through. It does not inspect the content of the packets like an Application level gateway or Stateful Multilayer Inspection firewall, but instead focuses on controlling the flow of traffic based on the session information. Packet Filtering firewall, on the other hand, operates at the network layer and does not provide the ability to hide private network information.

Submit
52. Which of the information below can be gained through network sniffing? (Select all that apply)

Explanation

Network sniffing is a technique used to capture and analyze network traffic. By intercepting and inspecting data packets, an attacker can gain access to sensitive information transmitted over the network. Telnet passwords, syslog traffic, and DNS traffic can all be obtained through network sniffing. Telnet passwords can be captured if they are transmitted in plain text, while syslog traffic and DNS traffic can reveal information about network activity and communication. Programming errors, however, cannot be directly gained through network sniffing as they are typically related to software development and not network traffic.

Submit
53. If a network is at risk from unskilled individuals, what type of threat is this?

Explanation

Unstructured threats refer to threats posed by unskilled individuals who may not have specific knowledge or expertise in hacking or attacking computer networks. These individuals may engage in activities that can unintentionally or unknowingly compromise the security of a network, such as clicking on malicious links or downloading infected files. Therefore, if a network is at risk from unskilled individuals, it can be categorized as an unstructured threat.

Submit
54. Alex is administrating the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?

Explanation

Alex will use the command "netstat -an" to check all the remote addresses and ports in numerical form. The "netstat" command is used to display active network connections, routing tables, and a variety of network interface statistics. The "-an" option specifically displays all active connections and listening ports in numerical form, without resolving hostnames or port names. This command will provide Alex with a comprehensive view of the network's remote addresses and ports.

Submit
55. The company James works for wants to implement a biometric authentication technique. James researched and found various biometric authentication techniques and their functions. Match the correct authentication technique with their use:
Submit
56. During a security awareness program, management was explaining the various reasons which create threats to network security. Which could be a possible threat to network security?

Explanation

Having a web server in the internal network can be a possible threat to network security because it increases the risk of unauthorized access and potential attacks from both internal and external sources. If the web server is not properly secured, it can be exploited by hackers to gain access to sensitive information, inject malicious code, or launch other types of attacks. Therefore, it is important to implement strong security measures and regularly update and patch the web server to mitigate these risks.

Submit
57. Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?

Explanation

Steven should enable Network Address Translation (NAT) on the firewall to ensure that the IP addresses used within the company are private addresses and not accessible directly from public Internet devices. NAT allows the firewall to translate the public IP addresses of the workstations to private IP addresses when communicating with the Internet, providing an additional layer of security by hiding the internal network structure from external sources.

Submit
58. John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?

Explanation

The correct answer is "Router(Config-if) # IP route – cache flow". This command is used to enable NetFlow on a specific interface in a Cisco router. By enabling NetFlow, John will be able to collect and monitor the IP network traffic passing through that interface.

Submit
59. Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements: 1. It has a parity check to store all the information about the data in multiple drives 2. Help reconstruct the data during downtime. 3. Process the data at a good speed. 4. Should not be expensive. The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?

Explanation

RAID 3 is the appropriate RAID level that Nancy will suggest. RAID 3 uses parity check to store information about the data in multiple drives, helping in data reconstruction during downtime. It also offers good data processing speed. Additionally, RAID 3 is cost-effective as it requires only one dedicated drive for storing parity information.

Submit
60. Identify the password cracking attempt involving precomputed hash values stored as plaintext and using these to crack the password.

Explanation

A rainbow table is a type of password cracking attempt that involves precomputed hash values stored as plaintext. These precomputed tables contain a large number of possible passwords and their corresponding hash values. By using these tables, an attacker can quickly look up the hash value of a stolen password and find the corresponding plaintext password, thus cracking the password. This method is much faster than brute force or dictionary attacks, making it an efficient way to crack passwords.

Submit
61. Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.

Explanation

DSSS stands for Direct Sequence Spread Spectrum. It is a spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code. This spreading code spreads the signal over a larger bandwidth, making it more resistant to interference and jamming. DSSS is commonly used in wireless communication systems, such as Wi-Fi and Bluetooth, to improve signal quality and security.

Submit
62. Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching. Which type of network-based IDS is Sam implementing?

Explanation

Sam is implementing a signature-based IDS. This type of IDS works by comparing network traffic patterns against a database of known attack signatures. It identifies malicious activity by matching the patterns of network packets with the signatures in its database. This approach is effective in detecting well-known attacks, but it may struggle with new or unknown threats.

Submit
63. The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident. Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)

Explanation

The team should add installing antivirus software as a countermeasure to deal with future malware incidents. Antivirus software can help detect and remove malware from the network, providing an additional layer of protection against potential threats. By regularly updating and scanning the network with antivirus software, the team can minimize the risk of future malware incidents.

Submit
64. An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?

Explanation

The IDS sensor should be placed at Location 2 because it allows for monitoring and inspecting large amounts of traffic. Placing the sensor at this location would help detect unauthorized attempts from inside the organization, as desired by the administrator.

Submit
65. Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?

Explanation

The first step the team should take to create the network vulnerability assessment plan is to acquire the necessary documents, review security policies, and ensure compliance. This step is crucial as it lays the foundation for the assessment by providing the team with the necessary information and guidelines to identify vulnerabilities in the network. Analyzing gathered data, making hypotheses, or creating an executive report can only be done effectively after acquiring the required documents and understanding the existing security measures in place.

Submit
66. An US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that require a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. What RAID level is John considering to meet this requirement?

Explanation

John is considering RAID level 50 to meet the requirement of high fault tolerance and high speed for data read and write operations. RAID level 50 combines the features of RAID level 0 and RAID level 5. It requires a minimum of six drives and provides both striping and parity for data protection. This combination offers a high level of fault tolerance and improved performance for data access.

Submit
67. David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the ________ framework, as it provides a set of controls over IT and consolidates them to form a framework.

Explanation

David suggests the COBIT framework because it provides a set of controls over IT and consolidates them to form a framework. COBIT (Control Objectives for Information and Related Technologies) is a widely recognized framework that helps organizations align their IT goals with their business goals. It provides a comprehensive set of best practices and guidelines for managing and governing IT processes, ensuring that they support the overall objectives of the company. COBIT helps organizations achieve effective IT governance, risk management, and compliance, making it an ideal choice for aligning IT goals to business goals in a mid-sized IT company.

Submit
68. Which of the following is a best practice for wireless network security?

Explanation

Using SSID cloaking is a best practice for wireless network security. SSID cloaking hides the network's name (SSID) from being broadcasted, making it more difficult for unauthorized users to detect and connect to the network. This adds an extra layer of protection to the wireless network by making it less visible to potential attackers.

Submit
69. Identify the minimum number of drives required to setup RAID level 5.

Explanation

RAID level 5 requires a minimum of three drives to be set up. In RAID 5, data is striped across multiple drives with parity information distributed across all drives. This provides fault tolerance as if one drive fails, the data can be reconstructed using the parity information on the remaining drives. Therefore, at least three drives are needed to ensure redundancy and data protection in RAID level 5.

Submit
70. Katie has implemented the RAID level that split data into blocks and evenly write the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of __________ in order to setup.

Explanation

The RAID level that splits data into blocks and evenly writes the data to multiple hard drives without providing data redundancy is RAID 0. RAID 0 requires a minimum of two drives in order to set up.

Submit
71. James wants to implement certain control measures to prevent denial-of-service attacks against the organization. Which of the following control measures can help James?

Explanation

Reducing the sessions time-out duration for the connection attempts can help prevent denial-of-service attacks by limiting the amount of time an attacker has to establish and maintain a connection. By setting a shorter time-out duration, any connection attempts that exceed this time limit will be terminated, preventing the attacker from tying up system resources and potentially causing a denial-of-service. This control measure adds an additional layer of protection to the organization's network infrastructure.

Submit
72. Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the ____________ implementation of a VPN.

Explanation

In the tunnel mode implementation of a VPN, the traffic is encapsulated twice as it passes through the gateway. Both the header and payload are encapsulated, providing an additional layer of security for the communication between the branch office and head office. This mode is commonly used in site-to-site VPN architectures to ensure the confidentiality and integrity of the data being transmitted.

Submit
73. Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk factor. What are they? (Select all that apply) Risk factor = …………. X …………… X ………..

Explanation

The risk factor for an organization is calculated by multiplying certain parameters together. These parameters include vulnerability, impact, and threat. By considering the vulnerability of the organization's systems, the potential impact of a security breach, and the likelihood of an attack or threat occurring, management can determine the overall risk factor.

Submit
74. Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented. What is the correct hierarchy for a security policy implementation?

Explanation

The correct hierarchy for a security policy implementation is Laws, Regulations, Policies, Standards, and Procedures. This order ensures that the security policies are aligned with the legal requirements and regulations imposed by governing bodies. Policies are then developed based on these laws and regulations, followed by the establishment of standards to provide guidelines for implementation. Finally, procedures are created to outline the specific steps and actions needed to enforce the policies and standards effectively.

Submit
75. You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the network. What will be your first reaction as a first responder?

Explanation

As a first responder, your first reaction should be to avoid fear, uncertainty, and doubt. This means staying calm and composed in order to effectively handle the situation. By avoiding fear, uncertainty, and doubt, you can maintain a clear mindset and make rational decisions. This will help you respond to the DoS incident in a focused and efficient manner, rather than getting overwhelmed or making hasty decisions. Communication, making an initial assessment, and disabling virus protection may be important steps to take, but they should be done after avoiding fear, uncertainty, and doubt.

Submit
76. Kelly is taking backups of the organization's data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type of backup is Kelly using?

Explanation

Kelly is using an incremental backup. This type of backup only includes files that have been created or modified since the last backup. It does not include all files in the organization's data, like a full backup would. Incremental backups are efficient because they only backup changes made since the previous backup, reducing the time and storage required for the backup process.

Submit
77. Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?

Explanation

The last step that Malone should list in his incident handling plan is a follow-up. This step is important to ensure that the incident has been fully resolved and to evaluate the effectiveness of the incident response process. A follow-up may involve conducting a post-incident review, documenting lessons learned, updating procedures, and communicating with relevant stakeholders.

Submit
78. Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.

Explanation

In a ring network topology, each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination. In this topology, the computers are connected in a circular manner, forming a ring. Each computer receives the data, processes it, and then passes it along to the next computer until it reaches the intended recipient. This ensures that the data flows consistently in one direction, making it an efficient and reliable network topology for certain applications.

Submit
79. The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank's business is very high. How should this risk be categorized in the risk matrix?

Explanation

The risk should be categorized as "Extreme" in the risk matrix because the probability of an incident that could impact 80% of the bank's business is very high. This indicates a significant potential impact on the bank's operations and suggests that immediate action should be taken to mitigate the risk.

Submit
80. Alex is administrating the firewall in the organization's network. What command will he use to check the ports applications open?

Explanation

Alex will use the command "netstat -an" to check the ports applications open. The "netstat" command is used to display active network connections, listening ports, and routing tables. The "-a" option shows all active connections and listening ports, while the "-n" option displays the addresses and port numbers in numerical form. Therefore, "netstat -an" will provide Alex with a comprehensive list of all open ports and their associated applications in the organization's network.

Submit
81. Tom works as a network administrator in a multinational organization having branches across North America and Europe. Tom wants to implement a storage technology that can provide centralized data storage and provide free data backup on the server. He should be able to perform data backup and recovery more efficiently with the selected technology. Which of the following storage technologies best suits Tom's requirements?

Explanation

NAS (Network Attached Storage) is the best storage technology for Tom's requirements. NAS provides centralized data storage, allowing multiple users to access and share files over a network. It also offers free data backup on the server, ensuring data security. Additionally, NAS allows for efficient data backup and recovery, making it a suitable choice for Tom's needs as a network administrator in a multinational organization with branches across different regions.

Submit
82. Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. Which network topology will help the administrator solve the problem of needing to add new employees and expand?

Explanation

The star network topology will help the administrator solve the problem of needing to add new employees and expand. In a star topology, each employee is connected to a central hub or switch, allowing for easy scalability and the addition of new employees without disrupting the existing network. This topology also provides better performance and fault tolerance, as any issues with one connection will not affect the entire network.

Submit
83. Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?

Explanation

The last step that Malone should list in his incident handling plan is a follow-up. After the incident has been contained, eradicated, and the system has been recovered, it is important to conduct a follow-up to evaluate the effectiveness of the incident response process and identify any areas for improvement. This step ensures that lessons learned from the incident are documented and can be used to enhance future incident handling procedures.

Submit
84. Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium?

Explanation

The network administrator will consider capability, extensibility, and reliability when deciding on the appropriate backup medium for the organization's needs. Capability refers to the ability of the backup medium to effectively store and restore data. Extensibility refers to the scalability of the backup medium, allowing it to accommodate future growth and increasing data storage requirements. Reliability is crucial as it ensures that the backup medium can consistently and accurately backup and restore data without errors or failures.

Submit
85. As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ____________integrity check mechanism provides security against a replay attack

Explanation

The correct answer is CBC-MAC. CBC-MAC (Cipher Block Chaining Message Authentication Code) is an integrity check mechanism used in WPA2 encryption. It provides security against replay attacks by ensuring that the data has not been modified during transmission. CBC-MAC uses a symmetric encryption algorithm to generate a fixed-size authentication tag which is appended to the message. This tag is then used to verify the integrity of the message upon receipt. CRC-32, CRC-MAC, and CBC-32 are not integrity check mechanisms used in WPA2 encryption.

Submit
86. Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs responds with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?

Explanation

Cindy is performing a half-open scan to identify live hosts on her network. In this type of scan, she sends out SYN packets to a range of IP addresses and waits for a SYN/ACK response from the hosts. Instead of completing the connection, she sends RST packets to terminate the session. By doing this, she can observe how her intrusion detection system logs the traffic and identify any potential vulnerabilities or suspicious activity on her network.

Submit
87. Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?

Explanation

Management will decide to implement ISO/IEC 27005 because it is the ISO standard specifically focused on information security risk management. ISO/IEC 27004 is a standard for information security management measurement, ISO/IEC 27002 is a standard for information security controls, and ISO/IEC 27006 is a standard for the certification of information security management systems.

Submit
88. An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?

Explanation

The attacker is using the Dictionary password cracking technique. This technique involves using a file containing a list of commonly used passwords, also known as a dictionary, to attempt to crack passwords. The attacker uploads this file into a cracking application that runs against the user accounts, systematically trying each password in the dictionary until a match is found. This technique is often successful because many users choose weak passwords that are easily found in a dictionary.

Submit
89. James was inspecting ARP packets in his organization's network traffic with the help of Wireshark. He is checking the volume of traffic containing ARP requests as well as the source IP address from which they are originating. Which type of attack is James analyzing?

Explanation

James is analyzing an ARP sweep attack. An ARP sweep is a type of network reconnaissance attack where an attacker sends a large number of ARP requests to map out the IP addresses and MAC addresses of devices on a network. By inspecting the volume of traffic containing ARP requests and the source IP addresses, James can identify if there is an ARP sweep attack happening on his organization's network.

Submit
90. Will is working as a Network Administrator. Management wants to maintain a backup of all the company data as soon as it starts operations. They decided to use a RAID backup storage technology for their data backup plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data written to one disk is copied automatically to the other disk as well. This maintains an additional copy of the data. Which RAID level is used here?

Explanation

In this scenario, Will sets up a pair of RAID disks where all the data written to one disk is automatically copied to the other disk. This configuration is known as RAID 1, also known as disk mirroring. RAID 1 provides redundancy by maintaining an additional copy of the data on a separate disk, ensuring data availability in case of disk failure.

Submit
91. Rick has implemented several firewalls and IDS systems across his enterprise network. What should he do to effectively correlate all incidents that pass through these security controls?

Explanation

To effectively correlate all incidents that pass through the firewalls and IDS systems, Rick should use Network Time Protocol (NTP). NTP is a protocol used to synchronize the clocks of network devices, ensuring accurate timekeeping. By synchronizing the clocks on all the security controls, Rick can accurately correlate the incidents based on the timestamps. This will help him identify patterns, detect any coordinated attacks, and analyze the sequence of events across the network. Using NTP will provide a consistent and reliable time reference for incident correlation.

Submit
92. You are responsible for network functions and logical security throughout the corporation. Your company has over 250 servers running Windows Server 2012, 5000 workstations running Windows 10, and 200 mobile users working from laptops on Windows 8. Last week 10 of your company's laptops were stolen from a salesman, while at a conference in Barcelona. These laptops contained proprietary company information. While doing a damage assessment, a news story leaks about a blog post containing information about the stolen laptops and the sensitive information. What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?

Explanation

The Encrypted File System (EFS) is a built-in Windows feature that provides encryption for individual files and folders on a Windows operating system. By implementing EFS on the stolen laptops, the sensitive information stored on them would have been protected. EFS uses symmetric key encryption, which means that the data can only be accessed with the correct encryption key. This would have prevented unauthorized access to the proprietary company information even if the laptops were stolen.

Submit
93. Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?

Explanation

Remediation is the phase of vulnerability management that deals with the actions taken to correct the discovered vulnerability. This phase involves implementing patches, fixes, or other measures to address the vulnerability and reduce the associated risk. It is an essential step in the vulnerability management process to ensure the security and integrity of systems and networks.

Submit
94. Mark is monitoring the network traffic on his organization's network. He wants to detect a TCP and UDP ping sweep on his network. Which type of filter will be used to detect this on the network?

Explanation

The correct answer is "tcp.dstport==7 and udp.dstport==7" because this filter will check for network traffic where the destination port for both TCP and UDP packets is 7. This is significant because port 7 is commonly used for the Echo protocol, which is often used in ping sweeps to check for the availability of hosts on a network. By filtering for this specific combination of TCP and UDP packets with a destination port of 7, Mark will be able to detect any TCP and UDP ping sweeps on his network.

Submit
95. You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?

Explanation

A NIDS (Network Intrusion Detection System) device would work best for the company. This device monitors network traffic and detects any malicious or questionable activity. It does not drop or block the traffic, but instead sends notifications to the IT employees when such activity is found. This aligns with the company's requirement of only wanting notification without dropping traffic completely. A NIDS device would allow the company to proactively identify and respond to potential security threats on their network.

Submit
96. Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement and be network-wide. What type of solution would be best for Lyle?

Explanation

The best solution for Lyle would be a NIPS (Network Intrusion Prevention System) implementation. This type of solution can effectively prevent external attacks on the network by dropping malicious packets. It is easy to implement and can provide network-wide security. Given Lyle's concerns and requirements, a NIPS implementation would be the most suitable choice for him.

Submit
97. The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header. What mode of ESP does Jacob need to use to encrypt the IP traffic?

Explanation

Jacob needs to use ESP in tunnel mode to encrypt the IP traffic. Tunnel mode encapsulates the entire IP packet within a new IP packet, adding an additional IP header to protect the original packet. This mode is commonly used to establish secure communication between two networks or to create virtual private networks (VPNs) where the original IP packet is protected and hidden from potential attackers.

Submit
98. Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?

Explanation

The Acceptable Use Policy (AUP) is a set of rules and guidelines that define the acceptable and appropriate use of company resources, systems, and networks by employees. It outlines the responsibilities and expectations for employees regarding the use of technology and information assets. Since the AUP is specific to the company's systems and networks, it falls under the category of System Specific Security Policy (SSSP). This policy focuses on the security measures and guidelines for a particular system or network within an organization.

Submit
99. James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. Which of the following Wireshark filters will he use?

Explanation

James will use the filter "icmp.type==8 or icmp.type==0" to check and analyze the traffic against a PING sweep attack. This filter will capture ICMP Echo Request (Type 8) and ICMP Echo Reply (Type 0) packets, which are commonly used in PING sweep attacks. By analyzing these packets, James can identify any suspicious or abnormal PING sweep activity on his network.

Submit
100. Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other. How will they ensure the authenticity of their emails?

Explanation

Dan will use his digital signature to sign his mails while Alex will use Dan's public key to verify the authenticity of the mails. This ensures the authenticity of the emails because the digital signature is unique to Dan and can only be generated using his private key. By using Dan's public key, Alex can verify that the email was indeed signed by Dan and has not been tampered with during transmission.

Submit
101. John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a _________ and it has to adhere to the ___________

Explanation

John is scanning the application to verify if the vulnerability has been successfully remediated. This process is called verification. During the verification process, John needs to adhere to the security policies in place to ensure that the application is secure and no vulnerabilities are present.

Submit
102. A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a __________ identified which helps measure how risky an activity is.

Explanation

A Key Risk Indicator is a measure that helps assess the level of risk associated with an activity or situation. It provides a way to identify and monitor potential risks within an organization. By not having a Key Risk Indicator identified, the organization is unable to effectively measure and evaluate the level of risk involved in its activities. This can lead to a lack of awareness and preparedness for potential risks, making it difficult to implement appropriate risk management strategies.

Submit
103. John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?

Explanation

A packet filtering firewall works on the IP layer. The IP layer is responsible for addressing and routing packets across different networks. By filtering packets based on their IP addresses, a packet filtering firewall can control the flow of traffic in and out of a network, allowing or blocking specific packets based on predefined rules. This helps in protecting the network from unauthorized access and potential threats.

Submit
104. Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?

Explanation

Ross implemented discretionary access control. Discretionary access control allows individual users to set their own access control measures for their files and folders. In this case, Ross configured the access control measures in a way that allows the employees to have control over their own files and folders.

Submit
105. Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server's data daily to ensure nothing is lost. The power in the company's office is not always reliable, Kyle needs to make sure the servers do not go down or are without power for too long. Kyle decides to purchase an Uninterruptible Power Supply (UPS) that has a pair of inverters and converters to charge the battery and provides power when needed. What type of UPS has Kyle purchased?

Explanation

Kyle has purchased a Standby UPS. This type of UPS uses a pair of inverters and converters to charge the battery and provide power when needed. It is designed to provide backup power in case of a power outage and ensure that the servers do not go down or are without power for too long.

Submit
106. Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?

Explanation

Hub-and-Spoke is the correct answer because it refers to a VPN topology where all branch offices are connected to the main office through a central location, known as the hub. The hub acts as a central point of connection for all branch offices, allowing them to communicate with each other and the main office. This topology is commonly used when there is a need for a persistent connection between the main office and branch offices, which can be established using a third-party network or the Internet.

Submit
107. Daniel is monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. What type of network security approach is Daniel adopting?

Explanation

Daniel is adopting a reactive network security approach by monitoring network traffic with the help of a network monitoring tool to detect any abnormalities. This means that he is not taking proactive measures to prevent security incidents, but rather responding to them after they occur.

Submit
108. Brendan wants to implement a hardware based RAID system in his network. He is thinking of choosing a suitable RAM type for the architectural setup in the system. The type he is interested in provides access times of up to 20 ns. Which type of RAM will he select for his RAID system?

Explanation

Brendan will select SRAM for his RAID system. SRAM stands for Static Random Access Memory, which is a type of RAM that retains data as long as power is supplied to the system. It provides faster access times compared to other types of RAM, such as SDRAM or NVRAM. With access times of up to 20 ns, SRAM is a suitable choice for a hardware-based RAID system, as it allows for quick and efficient data retrieval and storage. NAND flash memory and NVRAM are not as suitable for this purpose, as they have slower access times.

Submit
109. Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works. The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of solution does Fred's boss want to implement?

Explanation

Fred's boss wants to implement a HIDS (Host-based Intrusion Detection System) solution. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. HIDS is a security measure that monitors and analyzes the activities on individual computers to detect any unauthorized access or malicious behavior. It helps to compensate for the risks of making users local administrators by providing an additional layer of security and detecting any potential threats or intrusions.

Submit
110. John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?

Explanation

John will use the Wireshark filters "tcp.flags==0x2b", "tcp.flags=0x00", and "tcp.options.mss_val

Submit
111. What command is used to terminate certain processes in an Ubuntu system?

Explanation

not-available-via-ai

Submit
112. Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

Explanation

Automated Field Correlation is an event correlation approach that systematically and intentionally checks and compares all the fields for positive and negative correlation with each other. It analyzes the correlation across one or multiple fields to determine the relationship between them. This approach uses automated algorithms and techniques to identify and understand the correlations, making it a comprehensive and efficient method for event correlation.

Submit
113. Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21. What does this source address signify?

Explanation

not-available-via-ai

Submit
114. The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed. What is/are the reason(s) Alex is suggesting that James use a differential backup? (Select all that apply)

Explanation

Alex is suggesting that James use a differential backup because it requires less storage space and is faster than a full backup. By using a differential backup, James will only need to back up the data that has changed since the last full backup, resulting in less data being stored and faster backup times compared to a full backup. This can be a more efficient and cost-effective approach for managing backups.

Submit
115. Harry has successfully completed the vulnerability scanning process and found serious vulnerabilities exist in the organization's network. Identify the vulnerability management phases through which he will proceed to ensure all the detected vulnerabilities are addressed and eradicated. (Select all that apply)

Explanation

After successfully completing the vulnerability scanning process and identifying serious vulnerabilities in the organization's network, Harry will proceed with the vulnerability management phases to address and eradicate the detected vulnerabilities. The first phase is mitigation, which involves taking immediate actions to reduce the impact of the vulnerabilities. The next phase is verification, where Harry will verify if the mitigation measures have been effective in reducing the vulnerabilities. Finally, the remediation phase will be carried out to fix the vulnerabilities completely and ensure they are eradicated from the network.

Submit
116. Match the following
Submit
117. What is the name of the authority that verifies the certificate authority in digital certificates?

Explanation

The Certificate Management system is responsible for verifying the certificate authority in digital certificates. This system ensures that the certificate authority is trustworthy and meets the necessary security standards. It manages the entire lifecycle of digital certificates, including issuing, revoking, and renewing certificates. The Certificate Management system plays a crucial role in maintaining the integrity and authenticity of digital certificates.

Submit
118. Which of the following acts as a verifier for the certificate authority?

Explanation

A registration authority acts as a verifier for the certificate authority by verifying the identity of individuals or entities requesting digital certificates. It ensures that the information provided by the certificate applicant is accurate and valid before the certificate authority issues the certificate. The registration authority plays a crucial role in maintaining the integrity and trustworthiness of the certificate authority's certification process.

Submit
119. The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?

Explanation

A fence is a physical security measure that can be used to prevent unauthorized access to restricted zones. It creates a physical barrier that makes it difficult for people to enter the area without proper credentials. By installing a fence, the organization can control and monitor who enters and exits the restricted zones, enhancing the overall physical security of the organization.

Submit
120. A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other function(s) of the device? (Select all that apply)

Explanation

A VPN Concentrator is a device that not only acts as a bidirectional tunnel endpoint among host machines but also performs other functions. It assigns user addresses, allowing users to have unique identifiers within the VPN network. It enables input/output (I/O) operations, facilitating the transfer of data between the host machines and the VPN network. Additionally, it manages security keys, ensuring secure communication and authentication between the host machines and the VPN network.

Submit
121. Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KRI) to assess the organization. Why is Chris calculating the KRI for his organization? It helps Chris to:

Explanation

Chris is calculating the Key Risk Indicator (KRI) for his organization because it helps him identify adverse events and notifies him when risks have reached threshold levels. This allows Chris to assess the organization's overall risk and take appropriate actions to mitigate potential risks and prevent adverse events from occurring. Additionally, by calculating the KRI, Chris can have a backward view of past incidents and facilitate post-incident management, which further enhances the organization's risk management capabilities.

Submit
122. Match the various types of IDS alerts with their description.
Submit
123. Match the following
Submit
124. Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. Which step should Malone list as the last step in the incident response methodology?

Explanation

The last step in the incident response methodology should be recovery because after the incident has been contained, eradicated, and the necessary actions have been taken, the focus should be on restoring normal operations and recovering any data or systems that were affected by the incident. Recovery is the final step in the incident response process before the incident is considered resolved.

Submit
125. Match the following
Submit
126. Match the following
Submit
127. Match the following
Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 14, 2019
    Quiz Created by
    Cfernandez212
Cancel
  • All
    All (127)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Stephanie is currently setting up email security so all company data...
An enterprise recently moved to a new office and the new neighborhood...
The network admin decides to assign a class B IP address to a host in...
Ivan needs to pick an encryption method that is scalable even though...
Which IEEE standard does wireless network use?
Management decides to implement a risk management system to reduce and...
Michael decides to view the ------------------ to track employee...
Blake is working on the company's updated disaster and business...
Stephanie is currently setting up email security so all company data...
A company has the right to monitor the activities of their employees...
A company wants to implement a data backup method which allows them to...
John has implemented _________ in the network to restrict the limit of...
------------ is a group of broadband wireless communications standards...
Harry has sued the company claiming they made his personal information...
Larry is responsible for the company's network consisting of 300...
Eric is receiving complaints from employees that their systems are...
------------ is a group of broadband wireless communications standards...
If there is a fire incident caused by an electrical appliance...
Which OSI layer does a Network Interface Card (NIC) work on?
Frank is a network technician working for a medium-sized law firm in...
A local bank wants to protect their card holder data. The bank should...
A network administrator is monitoring the network traffic with...
An organization needs to adhere to the__________________ rules for...
Management asked Adam to implement a system allowing employees to use...
The bank where you work has 600 windows computers and 400 Red Hat...
Blake is working on the company's updated disaster and business...
James is a network administrator working at a student loan company in...
Liza was told by her network administrator that they will be...
Heather has been tasked with setting up and implementing VPN tunnels...
George was conducting a recovery drill test as a part of his network...
Sam, a network administrator is using Wireshark to monitor the network...
The --------------- protocol works in the network layer and is...
John wants to implement a firewall service that works at the session...
According to the company's security policy, all access to any network...
As a network administrator, you have implemented WPA2 encryption in...
Identify the correct statements regarding a DMZ zone:
Jason has set a firewall policy that allows only a specific list of...
Paul is a network security technician working on a contract for a...
A network is setup using an IP address range of 0.0.0.0 to...
Which VPN QoS model guarantees the traffic from one customer edge (CE)...
Kyle, a front office executive, suspects that a Trojan has infected...
Kyle is an IT consultant working on a contract for a large energy...
Justine has been tasked by her supervisor to ensure that the company's...
Consider a scenario consisting of a tree network. The root Node N is...
Bryson is the IT manager and sole IT employee working for a federal...
Which of the following network monitoring techniques requires extra...
Simon had all his systems administrators implement hardware and...
Assume that you are working as a network administrator in the head...
Timothy works as a network administrator in a multinational...
Henry needs to design a backup strategy for the organization with no...
John wants to implement a firewall service that works at the session...
Which of the information below can be gained through network sniffing?...
If a network is at risk from unskilled individuals, what type of...
Alex is administrating the firewall in the organization's network....
The company James works for wants to implement a biometric...
During a security awareness program, management was explaining the...
Steven's company has recently grown from 5 employees to over 50....
John, the network administrator and he wants to enable the NetFlow...
Nancy is working as a network administrator for a small company....
Identify the password cracking attempt involving precomputed hash...
Identify the spread spectrum technique that multiplies the original...
Sam wants to implement a network-based IDS in the network. Sam finds...
The IR team and the network administrator have successfully handled a...
An administrator wants to monitor and inspect large amounts of traffic...
Smith is an IT technician that has been appointed to his company's...
An US-based organization decided to implement a RAID storage...
David is working in a mid-sized IT company. Management asks him to...
Which of the following is a best practice for wireless network...
Identify the minimum number of drives required to setup RAID level 5.
Katie has implemented the RAID level that split data into blocks and...
James wants to implement certain control measures to prevent...
Sean has built a site-to-site VPN architecture between the head office...
Management wants to calculate the risk factor for their organization....
Daniel is giving training on designing and implementing a security...
You are monitoring your network traffic with the Wireshark utility and...
Kelly is taking backups of the organization's data. Currently, he is...
Malone is finishing up his incident handling plan for IT before giving...
Identify the network topology where each computer acts as a repeater...
The risk assessment team in Southern California has estimated that the...
Alex is administrating the firewall in the organization's network....
Tom works as a network administrator in a multinational organization...
Geon Solutions INC., had only 10 employees when it started. But as...
Malone is finishing up his incident handling plan for IT before giving...
Management asked their network administrator to suggest an appropriate...
As a network administrator, you have implemented WPA2 encryption in...
Cindy is the network security administrator for her company. She just...
Management wants to bring their organization into compliance with the...
An attacker uses different types of password cracking techniques to...
James was inspecting ARP packets in his organization's network traffic...
Will is working as a Network Administrator. Management wants to...
Rick has implemented several firewalls and IDS systems across his...
You are responsible for network functions and logical security...
Which phase of vulnerability management deals with the actions taken...
Mark is monitoring the network traffic on his organization's network....
You are an IT security consultant working on a contract for a large...
Lyle is the IT director for a medium-sized food service supply company...
The agency Jacob works for stores and transmits vast amounts of...
Assume that you are a network administrator and the company has asked...
James is working as a Network Administrator in a reputed company...
Dan and Alex are business partners working together. Their...
John has successfully remediated the vulnerability of an internal...
A newly joined network administrator wants to assess the organization...
John wants to implement a packet filtering firewall in his...
Ross manages 30 employees and only 25 computers in the organization....
Kyle is an IT technician managing 25 workstations and 4 servers. The...
Which of the following VPN topologies establishes a persistent...
Daniel is monitoring network traffic with the help of a network...
Brendan wants to implement a hardware based RAID system in his...
Fred is a network technician working for Johnson Services, a temporary...
John is a network administrator and is monitoring his network traffic...
What command is used to terminate certain processes in an Ubuntu...
Which of the following Event Correlation Approach checks and compares...
Frank installed Wireshark at all ingress points in the network....
The company has implemented a backup plan. James is working as a...
Harry has successfully completed the vulnerability scanning process...
Match the following
What is the name of the authority that verifies the certificate...
Which of the following acts as a verifier for the certificate...
The network administrator wants to strengthen physical security in the...
A VPN Concentrator acts as a bidirectional tunnel endpoint among host...
Chris is a senior network administrator. Chris wants to measure the...
Match the various types of IDS alerts with their description.
Match the following
Malone is finishing up his incident handling plan for IT before giving...
Match the following
Match the following
Match the following
Alert!

Advertisement