Certified Network Defender TEST C
![]() |
![]() |
![]() |
Title of test:![]() Certified Network Defender TEST C Description: 312-38 Exam -CND |




New Comment |
---|
NO RECORDS |
Which of the following fields in the IPv6 header replaces the TTL field in the IPv4 header?. Next header. Traffic class. Hop limit. Version. Which of the following IEEE standards defines a physical bus topology?. 802.4. 802.5. 802.6. 802.3. Which of the following protocols is described as a connection-oriented and reliable delivery transport layer protocol?. UDP. IP. SSL. TCP. Which of the following protocols is used for inter-domain multicast routing?. BGP. RPC. VoIP. RADIUS. How many layers are present in the OSI layer model?. 5. 4. 7. 9. Which of the following is an electronic device that helps in forwarding data packets along networks?. Route. Hub. Repeater. Gateway. Which of the following represents a network that connects two or more LANs in the same geographical area?. PAN. WAN. MAN. SAN. The IP addresses reserved for experimental purposes belong to which of the following classes?. Class E. Class C. Class A. Class D. Which of the following layers is closest to the end user?. Application layer. Physical layer. Session layer. Presentation layer. Which of the following IEEE standards defines the token passing ring topology?. 802.4. 802.5. 802.3. 802.7. Which of the following layers of the OSI model provides physical addressing?. Application layer. Network layer. Physical layer. Data link layer. Which of the following protocols sends a jam signal when a collision is detected?. ALOHA. CSMA/CA. CSMA/CD. CSMA. Which of the following key features limits the rate a sender transfers data to guarantee reliable delivery?. Ordered data transfer. Error-free data transfer. Flow control. Congestion control. Which of the following OSI layers is sometimes called the syntax layer?. Presentation layer. Application layer. Physical layer. Data link layer. In which of the following transmission modes is data sent and received alternatively?. Simplex mode. Bridge mode. Half-duplex mode. Full-duplex mode. Which of the following IEEE standards adds QoS features and multimedia support?. 802.11b. 802.11e. 802.5. 802.11a. What is the range for well known ports?. 49152 through 65535. 1024 through 49151. Above 65535. 0 through 1023. Which of the following IEEE standards defines the demand priority access method?. 802.15. 802.3. 802.12. 802.11. Which of the following is an example of a network providing DQDB access methods?. IEEE 802.3. IEEE 802.2. IEEE 802.4. IEEE 802.6. Which of the following OSI layers formats and encrypts data to be sent across the network?. Transport layer. Network layer. Physical layer. Presentation layer. Which of the following protocols is used in wireless networks?. CSMA. CSMA/CD. ALOHA. CSMA/CA. Token Ring is standardized by which of the following IEEE standards?. 802.2. 802.5. 802.3. 802.1. Which of the following protocols is used to report an error in datagram processing?. ARP. BGP. ICMP. DHCP. Which of the following is a high-speed network that connects computers, printers, and other network devices together?. MAN. LAN. WAN. CAN. Which of the following TCP/IP state transitions represents no connection state at all?. Closed. Closing. Close-wait. Fin-wait-1. What is the range for private ports?. 49152 through 65535. 1024 through 49151. Above 65535. 0 through 1023. Which of the following protocols supports source-specific multicast (SSM)?. DHCP. ARP. DNS. BGMP. Which of the following standards is approved by IEEE-SA for wireless personal area networks?. 802.11a. 802.15. 802.16. 802.1. Which of the following ranges of addresses can be used in the first octet of a Class A network address?. 0-127. 192-223. 224-255. 128-191. Which of the following ranges of addresses can be used in the first octet of a Class B network address?. 224-255. 128-191. 0-127. 192-223. Which of the following OSI layers defines the electrical and physical specifications for devices?. Data link layer. Presentation layer. Physical layer. Transport layer. Which of the following protocols is a method for implementing virtual private networks?. SSL. PPTP. TLS. SNMP. Which of the following layers provides communication session management between host computers?. Application layer. Internet layer. Transport layer. Link layer. Which of the following flags is set when a closed port responds to an Xmas tree scan?. RST. ACK. PUSH. FIN. Which of the following is a congestion control mechanism that is designed for unicast flows operating in an Internet environment and competing with TCP traffic?. Sliding Window. TCP Friendly Rate Control. Selective Acknowledgment. Additive increase/multiplicative-decrease. Which of the following protocols is used for routing of voice conversation over the Internet?. VoIP. DNS. DHCP. IP. Which of the following is a network point that acts as an entrance to another network?. Receiver. Hub. Bridge. Gateway. Which of the following IEEE standards is also called Fast Basic Service Set Transition?. 802.11r. 802.11e. 802.11a. 802.11b. In which of the following transmission modes is communication bi-directional?. Root mode. Simplex mode. Full-duplex mode. Half-duplex mode. Which of the following is a presentation layer protocol?. TCP. RPC. BGP. LWAPP. Which of the following is a session layer protocol?. RPC. SLP. RDP. ICMP. Which of the following IEEE standards is an example of a DQDB access method?. 802.3. 802.5. 802.6. 802.4. Which of the following classes of IP addresses provides a maximum of only 254 host addresses per network ID?. Class D. Class B. Class C. Class A. Which of the following ranges of addresses can be used in the first octet of a Class C network address?. 128-191. 192-223. 0-127. 224-255. Which of the following standards defines Logical Link Control (LLC)?. 802.2. 802.3. 802.5. 802.4. Which of the following layers performs routing of IP datagrams?. Transport layer. Link layer. Application layer. Internet layer. Which of the following IP addresses is the loopback address in IPv6?. 0:0:0:0:0:0:0:1. 0:0:0:1:1:0:0:0. 0:0:0:0:0:0:0:0. 1:0:0:0:0:0:0:0. What is the bit size of the Next Header field in the IPv6 header format?. 2 bits. 4 bits. 8 bits. 20 bits. Which of the following layers of the OSI model provides interhost communication?. Application layer. Network layer. Transport layer. Session layer. Which of the following IEEE standards provides specifications for wireless ATM systems?. 802.1. 802.5. 802.3. 802.11a. The IP addresses reserved for multicasting belong to which of the following classes?. Class B. Class E. Class C. Class D. Which of the following is a computer network that covers a broad area?. SAN. PAN. CAN. WAN. Which of the following layers of the OSI model provides end-to-end connections and reliability?. Transport layer. Session layer. Network layer. Physical layer. Which of the following IEEE standards operates at 2.4 GHz bandwidth and transfers data at a rate of 54 Mbps?. 802.11r. 802.11n. 802.11g. 802.11a. Which of the following layers refers to the higher-level protocols used by most applications for network communication?. Transport layer. Link layer. Application layer. Internet layer. Which of the following is the type of documented business rule for protecting information and the systems, which store and process the information?. Information protection policy. Information protection document. Information storage policy. Information security policy. Which of the following is the best known Windows tool for finding open wireless access points?. Netcat. Dsniff. Snort. Netstumbler. Which of the following UTP cables supports transmission up to 20MHz?. Category 2. Category 5e. Category 4. Category 1. Which of the following is also known as slag code?. Trojan. Logic bomb. Worm. IRC bot. Which of the following commands is used for port scanning?. nc -t. nc -z. nc -v. nc -d. Which of the following is a physical security device designed to entrap a person on purpose?. Mantrap. Trap. War Flying. War Chalking. Which of the following is a type of scam that entices a user to disclose personal information?. Phishing. Spamming. Sniffing. Smurfing. Which of the following UTP cables is NOT suitable for data transmission or Ethernet data work usage?. Category 6. Category 1. Category 4. Category 5. Which of the following tools is used for wireless LANs detection?. Airopeek. NetStumbler. Fort Knox. Sniffer. Which of the following is the main international standards organization for the World Wide Web?. W3C. ANSI. WASC. CCITT. Which of the following is used in conjunction with smoke detectors and fire alarm systems to improve and increase public safety?. Gaseous fire suppression. Gaseous emission system. Fire sprinkler. Fire suppression system. Which of the following is a term to describe the use of inert gases and chemical agents to extinguish a fire?. Gaseous fire suppression. Fire alarm system. Fire sprinkler. Fire suppression system. Which of the following techniques is also called access point mapping?. War dialing. Wire tapping. War flying. War driving. Which of the following is the process of managing incidents in an enterprise?. Log analysis. Incident response. Incident handling. Patch management. Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?. SuperScan. Netscan. Hping. Nmap. Which of the following is a method of authentication that uses physical characteristics?. COMSEC. ACL. Honeypot. Biometrics. Which of the following is a mandatory password-based and key-exchange authentication protocol?. PPP. CHAP. VRRP. DH-CHAP. Which of the following is susceptible to a birthday attack?. Authentication. Integrity. Authorization. Digital signature. Which of the following wireless networks provides connectivity over distance up to 20 feet?. WMAN. WPAN. WLAN. WWAN. Which of the following networks interconnects devices centered on an individual person's workspace?. WLAN. WPAN. WWAN. WMAN. Which of the following is a symmetric 64-bit block cipher that can support key lengths up to 448 bits?. HAVAL. BLOWFISH. IDEA. XOR. Which of the following protocols is used to exchange encrypted EDI messages via email?. S/MIME. MIME. HTTP. HTTPS. Which of the following are provided by digital signatures?. Identification and validation. Authentication and identification. Integrity and validation. Security and integrity. Which of the following is a passive attack?. Unauthorized access. Traffic analysis. Replay attack. Session hijacking. Which of the following is a malicious program that looks like a normal program?. Impersonation. Worm. Virus. Trojan horse. Which of the following is an IPSec protocol that can be used alone in combination with Authentication Header (AH)?. L2TP. PPTP. ESP. PPP. Which of the following attacks combines dictionary and brute force attacks?. Replay attack. Man-in-the-middle attack. Hybrid attack. Phishing attack. Which of the following attacks comes under the category of an active attack?. Replay attack. Wireless footprinting. Passive Eavesdropping. Traffic analysis. Which of the following encryption techniques do digital signatures use?. MD5. RSA. Blowfish. IDEA. Which of the following header fields in TCP/IP protocols involves Ping of Death attack?. SMTP header field. TCP header field. IP header field. UDP header field. Which of the following protocols is used for E-mail?. TELNET. MIME. SSH. SMTP. Which of the following modems offers wireless communication under water?. Controllerless modem. Short haul modem. Acoustic modem. Optical modem. Which of the following protocols is used by the Remote Authentication Dial In User Service (RADIUS) client/server protocol for data transmission?. DCCP. FTP. FCP. UDP. Which of the following applications is used for the statistical analysis and reporting of the log files?. Sawmill. Sniffer. Snort. jplag. Which of the following devices helps in connecting a PC to an ISP via a PSTN?. Adapter. Repeater. PCI card. Modem. Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?. Signature-Based ID system. Host-based ID system. Network-based ID system. Behavior-based ID system. Which of the following is a Cisco product that performs VPN and firewall functions?. Circuit-Level Gateway. PIX Firewall. IP Packet Filtering Firewall. Application Level Firewall. Which of the following is NOT a WEP authentication method?. Kerberos authentication. Media access authentication. Open system authentication. Shared key authentication. Which of the following helps in blocking all unauthorized inbound and/or outbound traffic?. IDS. IPS. Sniffe. Firewall. Which of the following is also known as stateful firewall?. PIX firewall. Stateless firewall. DMZ. Dynamic packet-filtering firewall. Which of the following is a centralized collection of honeypots and analysis tools?. Production honeypot. Honeynet. Research honeypot. Honeyfarm. Which of the following routing metrics is the sum of the costs associated with each link traversed?. Routing delay. Communication cost. Bandwidth. Path length. Which of the following honeypots is a useful little burglar alarm?. Backofficer friendly. Specter. Honeynet. Honeyd. What is the location of honeypot on a network?. Honeyfarm. Honeynet. Hub. DMZ. Which of the following is an open source implementation of the syslog protocol for Unix?. syslog-os. syslog Unix. syslog-ng. Unix-syslog. |