Last Updated on September 20, 2021 by Admin 2

312-38 : Certified Network Defender : Part 15

  1. Which of the following is a symmetric 64-bit block cipher that can support key lengths up to 448 bits?

    • HAVAL
    • BLOWFISH
    • IDEA
    • XOR
  2. Which of the following protocols is used to exchange encrypted EDI messages via email?

    • S/MIME
    • MIME
    • HTTP
    • HTTPS
  3. Which of the following are provided by digital signatures?

    • Identification and validation
    • Authentication and identification
    • Integrity and validation
    • Security and integrity
  4. Which of the following is a passive attack?

    • Unauthorized access
    • Traffic analysis
    • Replay attack
    • Session hijacking
  5. Which of the following is a malicious program that looks like a normal program?

    • Impersonation
    • Worm
    • Virus
    • Trojan horse
  6. Which of the following is an IPSec protocol that can be used alone in combination with Authentication Header (AH)?

    • L2TP
    • PPTP
    • ESP
    • PPP
  7. Which of the following attacks combines dictionary and brute force attacks?

    • Replay attack
    • Man-in-the-middle attack
    • Hybrid attack
    • Phishing attack
  8. Which of the following attacks comes under the category of an active attack?

    • Replay attack
    • Wireless footprinting
    • Passive Eavesdropping
    • Traffic analysis
  9. Which of the following encryption techniques do digital signatures use?

    • MD5
    • RSA
    • Blowfish
    • IDEA
  10. Which of the following header fields in TCP/IP protocols involves Ping of Death attack?

    • SMTP header field
    • TCP header field
    • IP header field
    • UDP header field
  11. Which of the following protocols is used for E-mail?

    • TELNET
    • MIME
    • SSH
    • SMTP
  12. Which of the following modems offers wireless communication under water?

    • Controllerless modem
    • Short haul modem
    • Acoustic modem
    • Optical modem
  13. Which of the following protocols is used by the Remote Authentication Dial In User Service (RADIUS) client/server protocol for data transmission?

    • DCCP
    • FTP
    • FCP
    • UDP
  14. Which of the following applications is used for the statistical analysis and reporting of the log files?

    • Sawmill
    • Sniffer
    • Snort
    • jplag
  15. Which of the following devices helps in connecting a PC to an ISP via a PSTN?

    • Adapter
    • Repeater
    • PCI card
    • Modem
  16. Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?

    • Signature-Based ID system
    • Host-based ID system
    • Network-based ID system
    • Behavior-based ID system
  17. Which of the following is a Cisco product that performs VPN and firewall functions?

    • Circuit-Level Gateway
    • PIX Firewall
    • IP Packet Filtering Firewall
    • Application Level Firewall
  18. Which of the following is NOT a WEP authentication method?

    • Kerberos authentication
    • Media access authentication
    • Open system authentication
    • Shared key authentication
  19. Which of the following helps in blocking all unauthorized inbound and/or outbound traffic?

    • IDS
    • IPS
    • Sniffer
    • Firewall
  20. Which of the following is also known as stateful firewall?

    • PIX firewall
    • Stateless firewall
    • DMZ
    • Dynamic packet-filtering firewall