CND2 Flashcards

1
Q

What number indicates a router advertisement?

A

9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What passes empty frames across the network so that the computers ready to send information to any other computer can insert data into the frame including the destination identifier?

A

Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What layer in TCP/IP performs modulation, bit and frame synchronization, and error detection?

A

Network Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In classful IP addressing, the router uses what octet to determine address class?

A

1st octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What IP class is referred to as 16/s

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What configuration vulnerability exists due to the misconfiguration of computing and network devices?

A

Default password and settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Improper password management vulnerability comes under which type of network security vulnerability?

A

Configuration Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of encryption do digital certificates use?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a limitation of hashing?

A

Fixed length string?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a thumbprint on a Digital Certificate?

A

Specifies the hash value for the certificate, verifies the certificate’s integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol provides centralized authentication, authorization, and accounting for remote access servers to communicate with a central server?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is a network security protocol used for authentication, authorization, and accounting for a network device like switches, routers and firewalls through one or more centralized servers?

A

TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What security requirement refers to the need of security for various components of IS - computers, networks, etc

A

Discipline Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What security requirement refers to the compliance requirement with various standards

A

Assurance Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which part of a security policy implementation focuses on security disciplines, safeguards, procedures, and more?

A

Policy Description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does security concept of operation do?

A

Defines roles and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the responsibilities of a network admin while configuring the firewall security policies?

A
  1. Authentication of service or application

2. Enable anti-spoofing protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What policy defines the guidelines for processing, storing, and transmitting sensitive information?

A

Information Protection Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does user account policy not define

A

Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What ISO standard addresses cybersecurity?

A

ISO/IEC 27032

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does ISO/IEC 27033-1 to -5 address?

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What ISO standard covers customer privacy?

A

ISO/IEC 27018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What ISO is known as ‘security metrics’?

A

ISO/IEC 27004

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What ISO defines ‘information security controls’?

A

ISO/IEC 27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a type of inherence factors?

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What tool traces the location of missing laptops for recovery?

A

Ztrace Gold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What type of malware can hide the payload part of the data packet?

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What type of malware can change the host by deleting files and reformatting the hard drive?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What command is used to access the Windows Registry?

A

regedit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the command for kernal configuration parameters in Linux?

A

/etc/sysct1.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What Linux Netstat command is used to know the processes that are accepting connections and a list of open ports?

A

netstat -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What does ‘/etc/crontab’ in Linux list?

A

System-wide periodic jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

If a network administrator wants to reduce the impact of unsolicited incoming emails to the email server of his/her organization, which of the following setting will helps to do this?

A

DNS-based blacklists (DNSBL) servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does a sys log server not provide

A

authentication for its messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What should be enabled in the Email server to prevent spoofed email addresses?

A

Sender Policy Framework (SPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Enabling IP-directed broadcasts will allow an attacker to perform what using a spoofed address?

A

Sending ICMP ECHO requests to another user broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What minimizes the consumption of host resources?

A

Physical Network Security Devices

38
Q

What is the process of mapping virtual networks to the underlying physical network

A

Virtual Network Embedding

39
Q

What allows an attacker to remotely control a virtual machine

A

Management console vulnerabilities

40
Q

Network isolation is based on what?

A

IPsec

41
Q

What firewall works as a proxy server?

A

Application Level Gateway

42
Q

What is considered while analyzing the security capability of a firewall solution?

A

Which type of firewall technologies it should support

43
Q

What protocol do firewalls use for token-based authentication?

A

RADIUS

44
Q

What OS does Netstat.exe work in?

A

Windows

45
Q

An exploit-based approach works based on which principle?

A

Packet-oriented pattern

46
Q

What is a browser-based firewall/VPN/Proxy server that generates scheduled reports on firewall traffic?

A

Firewall Analyzer

47
Q

What can detect an unexpected generation of a sequence of repeated commands?

A

Stateful protocol analysis

48
Q

What is not a function of IDS?

A

Vulnerability assessment

49
Q

What IDS detects patterns such as bandwidth?

A

Anomaly

50
Q

What classification is HIDS and NIDS

A

Protected System

51
Q

What causes an IDS false alarm

A

IDS bug

52
Q

What is not detected by Wireless Intrusion Prevention System?

A

Wireless Protocol Attacks

53
Q

What does a NBA not detect?

A

Unsecure WLAN devices

54
Q

What creates VPN connections and performs encapsulations?

A

VPN concentrator

55
Q

In which VPN, can a new site be easily added and only a central site needs to be updated?

A

Star

56
Q

What is a weak protocol that could allow a MITM attack on a VPN system?

A

IKE

57
Q

What is sent by RADIUS client to request the information for a permitted connection?

A

Accounting-request

58
Q

What terminates a VPN session?

A

Firewall

59
Q

What is sent in response to an access-request?

A

access-challenge

60
Q

What enables outside users to access TELNET?

A

Access Control List

61
Q

What VPN protocols use 128 bit encryption?

A

L2TP/IPSEC

PPTP

62
Q

What acts as a resource reservation control mechanism for a VPN

A

QoS

63
Q

What affects the connectivity between the client and the gateway in an undesireable way?

A

Network Address Translation

64
Q

What standard should VPNs follow?

A

FIPS

65
Q

LAWN uses which modulation technique?

A

Frequency-hopping Spread Spectrum (FHSS)

66
Q

What antenna concentrates EM energy?

A

Reflector Antenna

67
Q

What standard does MAN use?

A

802.16 Wi-MAX

68
Q

In what attack does an attacker set up a rogue access point outside corporate network and tricks employees to connect to it?

A

Client Mis-Association

69
Q

What SNMP command notifies SNMP managers about an event occurring?

A

TRAPS

70
Q

What SNMP command retrieves object identifiers?

A

Get Next

71
Q

What is true about router-based monitoring techniques?

A

The functionality is hardcoded into the router

72
Q

What layer does SNMP function?

A

Application

73
Q

What notifies SNMP managers about an event occurring in the network?

A

TRAPS

74
Q

A stealth scan is detected by observing large amounts of what type of packet?

A

RST

75
Q

In Xmas scan what response tells the attacker that the port is closed?

A

RST

76
Q

What framework supports IT governance and management toolset to enable managers to bridge the gap between control requirements, technical issues and business risks?

A

COBIT

77
Q

What does qualysguard help you perform?

A

Discovery

78
Q

Which vulnerability phase uses different spoof protection mechanisms?

A

Mitigation

79
Q

What is the functionality of the Retina CS tool?

A

Vulnerability assessment

80
Q

What does Nexpose do?

A

Vulnerability Assessment

81
Q

What is considered when picking the right vulnerability assessment tool?

A

Must create a baseline

82
Q

What is the process of comparing the data stored in the crashed system with the data stored in the other disk

A

Parity Check

83
Q

What do you use R-studio for?

A

Recover lost data

84
Q

What tool helps in recovering data lost in RAID storage media?

A

Disk Internals

85
Q

What backup tool is used with MACs

A

ChronoSync

86
Q

What helps to recover the entire contents of a broken NAS

A

ZAR X

87
Q

What does Norton Ghost help with?

A

Recover data from Windows-based systems

88
Q

What phase lets an IR team decide whether an incident response is required?

A

Detection and Analysis

89
Q

What is a CAT 0 incident

A

Exercise / Network Training

90
Q

What is carried out in parallel with forensic investigation?

A

Containment

91
Q

Vulnerability Analysis is performed in what phase?

A

Eradication

92
Q

What phase determines course of action for an incident?

A

Recovery