312-38 : Certified Network Defender : Part 14
-
Which of the following is the type of documented business rule for protecting information and the systems, which store and process the information
- Information protection policy
- Information protection document
- Information storage policy
- Information security policy
-
Which of the following is the best known Windows tool for finding open wireless access points?
- Netcat
- Dsniff
- Snort
- Netstumbler
-
Which of the following UTP cables supports transmission up to 20MHz?
- Category 2
- Category 5e
- Category 4
- Category 1
-
Which of the following is also known as slag code?
- Trojan
- Logic bomb
- Worm
- IRC bot
-
Which of the following commands is used for port scanning?
- nc -t
- nc -z
- nc -v
- nc -d
-
Which of the following is a physical security device designed to entrap a person on purpose?
- Mantrap
- Trap
- War Flying
- War Chalking
-
Which of the following is a type of scam that entices a user to disclose personal information?
- Phishing
- Spamming
- Sniffing
- Smurfing
-
Which of the following UTP cables is NOT suitable for data transmission or Ethernet data work usage?
- Category 6
- Category 1
- Category 4
- Category 5
-
Which of the following tools is used for wireless LANs detection?
- Airopeek
- NetStumbler
- Fort Knox
- Sniffer
-
Which of the following is the main international standards organization for the World Wide Web?
- W3C
- ANSI
- WASC
- CCITT
-
Which of the following is used in conjunction with smoke detectors and fire alarm systems to improve and increase public safety?
- Gaseous fire suppression
- Gaseous emission system
- Fire sprinkler
- Fire suppression system
-
Which of the following is a term to describe the use of inert gases and chemical agents to extinguish a fire?
- Gaseous fire suppression
- Fire alarm system
- Fire sprinkler
- Fire suppression system
-
Which of the following techniques is also called access point mapping?
- War dialing
- Wire tapping
- War flying
- War driving
-
Which of the following is the process of managing incidents in an enterprise?
- Log analysis
- Incident response
- Incident handling
- Patch management
-
Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?
- SuperScan
- Netscan
- Hping
- Nmap
-
Which of the following is a method of authentication that uses physical characteristics?
- COMSEC
- ACL
- Honeypot
- Biometrics
-
Which of the following is a mandatory password-based and key-exchange authentication protocol?
- PPP
- CHAP
- VRRP
- DH-CHAP
-
Which of the following is susceptible to a birthday attack?
- Authentication
- Integrity
- Authorization
- Digital signature
-
Which of the following wireless networks provides connectivity over distance up to 20 feet?
- WMAN
- WPAN
- WLAN
- WWAN
-
Which of the following networks interconnects devices centered on an individual person’s workspace?
- WLAN
- WPAN
- WWAN
- WMAN
Subscribe
0 Comments
Newest