Question 1: What is the most common method of virus propagation? On infected floppy disks On infected CDs Through instant messaging attachments Through e-mail attachments Question 2: What is heuristic scanning? Scanning using a rules-based approach Scanning based on a virus definition file Scanning only system management areas (registry, boot …
Read More »Network Security Specialist – Operating System Hardening Quiz Answers
Question 1: A Linux system has a repository of packages available to be installed on the system True False Question 2: What account lockout threshold does the NSA reccomends? 5 tries 3 tries 4 tries 5 tries Question 3: Which of the following best describes the registry? A relational database …
Read More »Network Security Specialist – Virtual Private Networks (VPN) Quiz Answers
Question 1: Which of the following is a weakness in PPTP? Clear text passwords No encryption Used only with IP networks Not supported on most platforms Question 2: Which of the following is an important security feature in CHAP It periodically re-authenticates It uses 3DES encryption It is immune to …
Read More »Network Security Specialist – Fundamentals of Encryption Quiz Answers
Question 1: Which encryption algorithm uses a variable length symmetric key? RSA Blowfish DES PGP Question 2: Which of the following is a symmetric key system using blocks? RSA DES PGP Diffie-Hellman Question 3: What is the purpose of a certificate? To verify that software is virus free To guarantee …
Read More »Network Security Specialist – Intrusion-Detection Systems Quiz Answers
Question 1: What is a profiling technique that monitors how applications use resources called? System monitoring Resource profiling Application monitoring Executable profiling Question 2: What is an attempt to attract intruders to a system setup for monitoring them called? Intrusion deterrence Intrusion detection Intrusion banishment Intrusion routing Question 3: Which …
Read More »Network Security Specialist – Fundamentals of Firewalls Quiz Answers
Question 1: What type of firewall requires client applications to be authorised to connect? Screened gateway Stateful packet inspection Dual homed Application gateway Question 2: Which of the following is a combination of firewalls? Screened firewalls Router based firewalls Dual homed firewalls Bastion host firewalls Question 3: Which of the …
Read More »Network Security Specialist – Types of Attacks Quiz Answers
Question 1: To be protected against Ping of death attacks ensure that all operating systems are patched. True False Question 2: Smurf attack is a popular DoS attack True False Question 3: Which of the following is the best definition for IP spoofing? Sending a packet that appears to come …
Read More »Certified Network Security Specialist Quiz Answers
ICSI | CNSS Certified Network Security Specialist Questions and Answers Quiz 1: Network Security Specialist – Introduction to Network Security Quiz 2: Network Security Specialist – Types of Attacks Quiz 3: Network Security Specialist – Fundamentals of Firewalls Quiz 4: Network Security Specialist – Intrusion-Detection Systems Quiz 5: Network Security …
Read More »Network Security Specialist – Introduction to Network Security Quiz Answers
Module 1: Introduction to Network Security Question 1: Which of the following is the best definition for non-repudiation? Security that does not allow the potential intruder to deny his/her attack -Processes that verify which user performs what action It is another term for user authentication Access Control Question 2: What is …
Read More »International Cybersecurity Institue ICSI – Certified Network Security Specialist (CNSS) Free Course Certificate
Get Certificate: Certified Network Security Specialist (CNSS)Promocode: #StaySafeHomeOffer is valid till 31/08/2020 ICSI | CNSS Certified Network Security Specialist Questions and Answers Module 1: Introduction to Network SecurityModule 2: Types of AttacksModule 3: Fundamentals of FirewallsModule 4: Intrusion-Detection SystemsModule 5: Fundamentals of EncryptionModule 6: Virtual Private Networks (VPN)Module 7: Operating …
Read More »