CND V2 Quiz Questions and Answers

Which of the following is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion?

Answer :
  • Fire alarm system

John works as a C programmer. He develops the following C program: #include < stdlib.h > #include < stdio.h > #include < string.h > int buffer(char *str) { char buffer1[10]; strcpy(buffer1, str); return 1; } int main(int argc, char *argv[]) { buffer (argv[1]); printf(“Executed\n”); return 1; } His program is vulnerable to a __________ attack.

Answer :
  • Buffer overflow

Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? (Select all that apply)

Answer :
  • Wireless sniffer
  • Protocol analyzer

In which of the following conditions does the system enter ROM monitor mode? (Select all that apply)

Answer :
  • The user interrupts the boot sequence.
  • The router does not find a valid operating system image.

Which of the following is a protocol that describes an approach to providing “streamlined” support of OSI application services on top of TCP/IP-based networks for some constrained environments?

Answer :
  • Lightweight Presentation Protocol

You are an Administrator for a network at an investment bank. You are concerned about individuals breaching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?

Answer :
  • Implement a honey pot

Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? (Select all that apply)

Answer :
  • E-mail spam
  • Junk mail

Which of the following is a distributed multi-access network that helps in supporting integrated communications using a dual bus and distributed queuing?

Answer :
  • Distributed-queue dual-bus

Which of the following is a distributed application architecture that partitions tasks or workloads between service providers and service requesters? (Select all that apply)

Answer :
  • Client-server computing
  • Client-server networking

Which of the following is an attack on a website that changes the visual appearance of the site and seriously damages the trust and reputation of the website?

Answer :
  • Website defacement