312-38 : Certified Network Defender : Part 14

  1. Which of the following is the type of documented business rule for protecting information and the systems, which store and process the information

    • Information protection policy
    • Information protection document
    • Information storage policy
    • Information security policy
  2. Which of the following is the best known Windows tool for finding open wireless access points?

    • Netcat
    • Dsniff
    • Snort
    • Netstumbler
  3. Which of the following UTP cables supports transmission up to 20MHz?

    • Category 2
    • Category 5e
    • Category 4
    • Category 1
  4. Which of the following is also known as slag code?

    • Trojan
    • Logic bomb
    • Worm
    • IRC bot
  5. Which of the following commands is used for port scanning?

    • nc -t
    • nc -z
    • nc -v
    • nc -d
  6. Which of the following is a physical security device designed to entrap a person on purpose?

    • Mantrap
    • Trap
    • War Flying
    • War Chalking
  7. Which of the following is a type of scam that entices a user to disclose personal information?

    • Phishing
    • Spamming
    • Sniffing
    • Smurfing
  8. Which of the following UTP cables is NOT suitable for data transmission or Ethernet data work usage?

    • Category 6
    • Category 1
    • Category 4
    • Category 5
  9. Which of the following tools is used for wireless LANs detection?

    • Airopeek
    • NetStumbler
    • Fort Knox
    • Sniffer
  10. Which of the following is the main international standards organization for the World Wide Web?

    • W3C
    • ANSI
    • WASC
    • CCITT
  11. Which of the following is used in conjunction with smoke detectors and fire alarm systems to improve and increase public safety?

    • Gaseous fire suppression
    • Gaseous emission system
    • Fire sprinkler
    • Fire suppression system
  12. Which of the following is a term to describe the use of inert gases and chemical agents to extinguish a fire?

    • Gaseous fire suppression
    • Fire alarm system
    • Fire sprinkler
    • Fire suppression system
  13. Which of the following techniques is also called access point mapping?

    • War dialing
    • Wire tapping
    • War flying
    • War driving
  14. Which of the following is the process of managing incidents in an enterprise?

    • Log analysis
    • Incident response
    • Incident handling
    • Patch management
  15. Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?

    • SuperScan
    • Netscan
    • Hping
    • Nmap
  16. Which of the following is a method of authentication that uses physical characteristics?

    • COMSEC
    • ACL
    • Honeypot
    • Biometrics
  17. Which of the following is a mandatory password-based and key-exchange authentication protocol?

    • PPP
    • CHAP
    • VRRP
    • DH-CHAP
  18. Which of the following is susceptible to a birthday attack?

    • Authentication
    • Integrity
    • Authorization
    • Digital signature
  19. Which of the following wireless networks provides connectivity over distance up to 20 feet?

    • WMAN
    • WPAN
    • WLAN
    • WWAN
  20. Which of the following networks interconnects devices centered on an individual person’s workspace?

    • WLAN
    • WPAN
    • WWAN
    • WMAN
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments