CND2 Flashcards

1
Q

What number indicates a router advertisement?

A

9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What passes empty frames across the network so that the computers ready to send information to any other computer can insert data into the frame including the destination identifier?

A

Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What layer in TCP/IP performs modulation, bit and frame synchronization, and error detection?

A

Network Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In classful IP addressing, the router uses what octet to determine address class?

A

1st octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What IP class is referred to as 16/s

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What configuration vulnerability exists due to the misconfiguration of computing and network devices?

A

Default password and settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Improper password management vulnerability comes under which type of network security vulnerability?

A

Configuration Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of encryption do digital certificates use?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a limitation of hashing?

A

Fixed length string?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a thumbprint on a Digital Certificate?

A

Specifies the hash value for the certificate, verifies the certificate’s integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol provides centralized authentication, authorization, and accounting for remote access servers to communicate with a central server?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a network security protocol used for authentication, authorization, and accounting for a network device like switches, routers and firewalls through one or more centralized servers?

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What security requirement refers to the need of security for various components of IS - computers, networks, etc

A

Discipline Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security requirement refers to the compliance requirement with various standards

A

Assurance Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which part of a security policy implementation focuses on security disciplines, safeguards, procedures, and more?

A

Policy Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does security concept of operation do?

A

Defines roles and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the responsibilities of a network admin while configuring the firewall security policies?

A
  1. Authentication of service or application

2. Enable anti-spoofing protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What policy defines the guidelines for processing, storing, and transmitting sensitive information?

A

Information Protection Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does user account policy not define

A

Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What ISO standard addresses cybersecurity?

A

ISO/IEC 27032

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does ISO/IEC 27033-1 to -5 address?

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What ISO standard covers customer privacy?

A

ISO/IEC 27018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What ISO is known as ‘security metrics’?

A

ISO/IEC 27004

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What ISO defines ‘information security controls’?

A

ISO/IEC 27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a type of inherence factors?
Signature
26
What tool traces the location of missing laptops for recovery?
Ztrace Gold
27
What type of malware can hide the payload part of the data packet?
Trojans
28
What type of malware can change the host by deleting files and reformatting the hard drive?
Virus
29
What command is used to access the Windows Registry?
regedit
30
What is the command for kernal configuration parameters in Linux?
/etc/sysct1.conf
31
What Linux Netstat command is used to know the processes that are accepting connections and a list of open ports?
#netstat -a
32
What does '/etc/crontab' in Linux list?
System-wide periodic jobs
33
If a network administrator wants to reduce the impact of unsolicited incoming emails to the email server of his/her organization, which of the following setting will helps to do this?
DNS-based blacklists (DNSBL) servers
34
What does a sys log server not provide
authentication for its messages
35
What should be enabled in the Email server to prevent spoofed email addresses?
Sender Policy Framework (SPF)
36
Enabling IP-directed broadcasts will allow an attacker to perform what using a spoofed address?
Sending ICMP ECHO requests to another user broadcast address
37
What minimizes the consumption of host resources?
Physical Network Security Devices
38
What is the process of mapping virtual networks to the underlying physical network
Virtual Network Embedding
39
What allows an attacker to remotely control a virtual machine
Management console vulnerabilities
40
Network isolation is based on what?
IPsec
41
What firewall works as a proxy server?
Application Level Gateway
42
What is considered while analyzing the security capability of a firewall solution?
Which type of firewall technologies it should support
43
What protocol do firewalls use for token-based authentication?
RADIUS
44
What OS does Netstat.exe work in?
Windows
45
An exploit-based approach works based on which principle?
Packet-oriented pattern
46
What is a browser-based firewall/VPN/Proxy server that generates scheduled reports on firewall traffic?
Firewall Analyzer
47
What can detect an unexpected generation of a sequence of repeated commands?
Stateful protocol analysis
48
What is not a function of IDS?
Vulnerability assessment
49
What IDS detects patterns such as bandwidth?
Anomaly
50
What classification is HIDS and NIDS
Protected System
51
What causes an IDS false alarm
IDS bug
52
What is not detected by Wireless Intrusion Prevention System?
Wireless Protocol Attacks
53
What does a NBA not detect?
Unsecure WLAN devices
54
What creates VPN connections and performs encapsulations?
VPN concentrator
55
In which VPN, can a new site be easily added and only a central site needs to be updated?
Star
56
What is a weak protocol that could allow a MITM attack on a VPN system?
IKE
57
What is sent by RADIUS client to request the information for a permitted connection?
Accounting-request
58
What terminates a VPN session?
Firewall
59
What is sent in response to an access-request?
access-challenge
60
What enables outside users to access TELNET?
Access Control List
61
What VPN protocols use 128 bit encryption?
L2TP/IPSEC | PPTP
62
What acts as a resource reservation control mechanism for a VPN
QoS
63
What affects the connectivity between the client and the gateway in an undesireable way?
Network Address Translation
64
What standard should VPNs follow?
FIPS
65
LAWN uses which modulation technique?
Frequency-hopping Spread Spectrum (FHSS)
66
What antenna concentrates EM energy?
Reflector Antenna
67
What standard does MAN use?
802.16 Wi-MAX
68
In what attack does an attacker set up a rogue access point outside corporate network and tricks employees to connect to it?
Client Mis-Association
69
What SNMP command notifies SNMP managers about an event occurring?
TRAPS
70
What SNMP command retrieves object identifiers?
Get Next
71
What is true about router-based monitoring techniques?
The functionality is hardcoded into the router
72
What layer does SNMP function?
Application
73
What notifies SNMP managers about an event occurring in the network?
TRAPS
74
A stealth scan is detected by observing large amounts of what type of packet?
RST
75
In Xmas scan what response tells the attacker that the port is closed?
RST
76
What framework supports IT governance and management toolset to enable managers to bridge the gap between control requirements, technical issues and business risks?
COBIT
77
What does qualysguard help you perform?
Discovery
78
Which vulnerability phase uses different spoof protection mechanisms?
Mitigation
79
What is the functionality of the Retina CS tool?
Vulnerability assessment
80
What does Nexpose do?
Vulnerability Assessment
81
What is considered when picking the right vulnerability assessment tool?
Must create a baseline
82
What is the process of comparing the data stored in the crashed system with the data stored in the other disk
Parity Check
83
What do you use R-studio for?
Recover lost data
84
What tool helps in recovering data lost in RAID storage media?
Disk Internals
85
What backup tool is used with MACs
ChronoSync
86
What helps to recover the entire contents of a broken NAS
ZAR X
87
What does Norton Ghost help with?
Recover data from Windows-based systems
88
What phase lets an IR team decide whether an incident response is required?
Detection and Analysis
89
What is a CAT 0 incident
Exercise / Network Training
90
What is carried out in parallel with forensic investigation?
Containment
91
Vulnerability Analysis is performed in what phase?
Eradication
92
What phase determines course of action for an incident?
Recovery