Last Updated on July 19, 2021 by InfraExam
312-38 : Certified Network Defender : Part 15
-
Which of the following is a symmetric 64-bit block cipher that can support key lengths up to 448 bits?
- HAVAL
- BLOWFISH
- IDEA
- XOR
-
Which of the following protocols is used to exchange encrypted EDI messages via email?
- S/MIME
- MIME
- HTTP
- HTTPS
-
Which of the following are provided by digital signatures?
- Identification and validation
- Authentication and identification
- Integrity and validation
- Security and integrity
-
Which of the following is a passive attack?
- Unauthorized access
- Traffic analysis
- Replay attack
- Session hijacking
-
Which of the following is a malicious program that looks like a normal program?
- Impersonation
- Worm
- Virus
- Trojan horse
-
Which of the following is an IPSec protocol that can be used alone in combination with Authentication Header (AH)?
- L2TP
- PPTP
- ESP
- PPP
-
Which of the following attacks combines dictionary and brute force attacks?
- Replay attack
- Man-in-the-middle attack
- Hybrid attack
- Phishing attack
-
Which of the following attacks comes under the category of an active attack?
- Replay attack
- Wireless footprinting
- Passive Eavesdropping
- Traffic analysis
-
Which of the following encryption techniques do digital signatures use?
- MD5
- RSA
- Blowfish
- IDEA
-
Which of the following header fields in TCP/IP protocols involves Ping of Death attack?
- SMTP header field
- TCP header field
- IP header field
- UDP header field
-
Which of the following protocols is used for E-mail?
- TELNET
- MIME
- SSH
- SMTP
-
Which of the following modems offers wireless communication under water?
- Controllerless modem
- Short haul modem
- Acoustic modem
- Optical modem
-
Which of the following protocols is used by the Remote Authentication Dial In User Service (RADIUS) client/server protocol for data transmission?
- DCCP
- FTP
- FCP
- UDP
-
Which of the following applications is used for the statistical analysis and reporting of the log files?
- Sawmill
- Sniffer
- Snort
- jplag
-
Which of the following devices helps in connecting a PC to an ISP via a PSTN?
- Adapter
- Repeater
- PCI card
- Modem
-
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?
- Signature-Based ID system
- Host-based ID system
- Network-based ID system
- Behavior-based ID system
-
Which of the following is a Cisco product that performs VPN and firewall functions?
- Circuit-Level Gateway
- PIX Firewall
- IP Packet Filtering Firewall
- Application Level Firewall
-
Which of the following is NOT a WEP authentication method?
- Kerberos authentication
- Media access authentication
- Open system authentication
- Shared key authentication
-
Which of the following helps in blocking all unauthorized inbound and/or outbound traffic?
- IDS
- IPS
- Sniffer
- Firewall
-
Which of the following is also known as stateful firewall?
- PIX firewall
- Stateless firewall
- DMZ
- Dynamic packet-filtering firewall