CND2 Flashcards
What number indicates a router advertisement?
9
What passes empty frames across the network so that the computers ready to send information to any other computer can insert data into the frame including the destination identifier?
Token Ring
What layer in TCP/IP performs modulation, bit and frame synchronization, and error detection?
Network Access Layer
In classful IP addressing, the router uses what octet to determine address class?
1st octet
What IP class is referred to as 16/s
B
What configuration vulnerability exists due to the misconfiguration of computing and network devices?
Default password and settings
Improper password management vulnerability comes under which type of network security vulnerability?
Configuration Vulnerabilities
What type of encryption do digital certificates use?
Asymmetric
What is a limitation of hashing?
Fixed length string?
What is a thumbprint on a Digital Certificate?
Specifies the hash value for the certificate, verifies the certificate’s integrity
What protocol provides centralized authentication, authorization, and accounting for remote access servers to communicate with a central server?
RADIUS
Which of the following is a network security protocol used for authentication, authorization, and accounting for a network device like switches, routers and firewalls through one or more centralized servers?
TACACS+
What security requirement refers to the need of security for various components of IS - computers, networks, etc
Discipline Security
What security requirement refers to the compliance requirement with various standards
Assurance Security
Which part of a security policy implementation focuses on security disciplines, safeguards, procedures, and more?
Policy Description
What does security concept of operation do?
Defines roles and responsibilities
What are the responsibilities of a network admin while configuring the firewall security policies?
- Authentication of service or application
2. Enable anti-spoofing protection
What policy defines the guidelines for processing, storing, and transmitting sensitive information?
Information Protection Policy
What does user account policy not define
Remote Access
What ISO standard addresses cybersecurity?
ISO/IEC 27032
What does ISO/IEC 27033-1 to -5 address?
Network Security
What ISO standard covers customer privacy?
ISO/IEC 27018
What ISO is known as ‘security metrics’?
ISO/IEC 27004
What ISO defines ‘information security controls’?
ISO/IEC 27002
What is a type of inherence factors?
Signature
What tool traces the location of missing laptops for recovery?
Ztrace Gold
What type of malware can hide the payload part of the data packet?
Trojans
What type of malware can change the host by deleting files and reformatting the hard drive?
Virus
What command is used to access the Windows Registry?
regedit
What is the command for kernal configuration parameters in Linux?
/etc/sysct1.conf
What Linux Netstat command is used to know the processes that are accepting connections and a list of open ports?
netstat -a
What does ‘/etc/crontab’ in Linux list?
System-wide periodic jobs
If a network administrator wants to reduce the impact of unsolicited incoming emails to the email server of his/her organization, which of the following setting will helps to do this?
DNS-based blacklists (DNSBL) servers
What does a sys log server not provide
authentication for its messages
What should be enabled in the Email server to prevent spoofed email addresses?
Sender Policy Framework (SPF)
Enabling IP-directed broadcasts will allow an attacker to perform what using a spoofed address?
Sending ICMP ECHO requests to another user broadcast address