Education

ICSI | CNSS Certified Network Security Specialist Questions and Answers

Technical and general Cyber Security questions. These questions are designed to help you prepare for a role as a Cyber Security Specialist. Our 100+ Cyber Security questions and answers focus on all aspects of Cyber Security subject and topics. These questions are chosen from a collection of most questions asked on Cyber Security. Practice, spend at least 1 hour daily for a month to learn and assimilate Cyber Security.

Subscribe to our youtube channel, to get discount.

Who should Practice these Cyber Security Questions

  • Anyone preparing for an aptitude test in Cyber Security
  • Anyone wishing to broaden their knowledge in Cyber Security
  • Anyone preparing for interviews
  • Everyone – Students and Experienced.

The section contains questions on cyber attack types, hacking, security protocols, social engineering, terminologies, network intrusion, firewalls, security skills, exploits and exploitation, generally CNSS Certified Network Security Specialist examinations.

Part 1: Network Security and Cyber Defence Quiz

  1. What is the acronym of URL.

Answer- Uniform Resource Locator

  1. The most desirable approach to security is one which is:

Answer- Layered and dynamic

  1. Which of the following is not one of the major classes of threats?

Answer- Online auction fraud

  1. Malware is NOT a common threat for systems.

Answer- False

  1. Server Message Block (SMB) protocol runs on which port?

Answer- 445

  1. Subnetting is used to split a network into smaller portions.

Answer- True

  1. Blocking attacks seek to accomplish what?

Answer- Prevent Legitimate users from accessing a system

  1. Trivial File Transfer Protocol (TFTP) runs on which port?

Answer-69

  1. Class A Ips with range 0-126 are reserved for multicasting.

Answer- False

  1. Which of the following is the best definition for non-repudiation?

Answer- Processes that verify which user performs what action

Part 2: Types of Attacks

  1. Which of the following best describes session hacking?

Answer- Taking control of communication link between two machines

  1. Which of the following is the best definition of a virus?

Answer- Software that self-replicates

  1. The most common session-hijacking is man in the middle attack

Answer- True

  1. What is Trojan horse?
  • Answer- Software that appears to be benign but really has some malicious purpose
  • Answer- Software that causes harm to your system
  1. The point of hijacking a connection is to exploit trust and gain access to a system

Answer- True

  1. What is danger inherent in IP spoofing attacks?

Answer- Many firewalls do not examine packets that seem to come from within the network

  1. Which of the following is the best definition of IP spoofing?

Answer- Sending a packet that appears to come from a trusted IP address

  1. To be protected against Ping of death attacks ensure that all operating systems are patched.

Answer- True

  1. Smurf attack is a popular DoS attack

Answer- True

Part 3: Fundamentals of Firewalls

  1. Why a stateful packet inspection firewall is less susceptible to spoofing attacks?

Answer- It examines the source IP of all packets

  1. Which type of firewall is considered the most secure?

Answer- Stateful packet inspection

  1. Which of the following are four basics types of Firewalls?

Answer- Packet Filtering, application gateway, circuit level, stateful packet inspection

  1. Which of the following is an advantage of the network host-based configuration?

Answer- It is inexpensive or free

  1. Which of the following is combination of firewalls?

Answer- Screened firewalls

  1. What is the most important security advantage to NAT

Answer- It blocks incoming ICMP packets

  1. What type of firewall requires client applications to be authorized to connect?

Answer- Application gateway

  1. A device that hides its internal IP addresses is called?

Answer- Proxy Server

  1. Which of the following can be shipped preconfigured?

Answer- Router-based firewalls

  1. Why might a proxy gateway be susceptible to a flood attack?

Answer- It allows multiple simultaneous connections

Part 4: Intrusion Detection Systems

  1. A series of ICMP packets sent to your ports in sequence might indicate what?

Answer- A ping flood

  1. IDS is an acronym for:

Answer- Intrusion-detection system

  1. A system that is set up for attracting and monitoring intruders is called?

Answer-Honeypot

  1. Specter aggressive mode tries to trace the attacker and gain its identity

Answer-True

  1. Which of the following is not a profiling strategy used in anomaly detection?

Answer- System monitoring

  1. What type of IDS is Snort?

Answer- Host based

  1. Specter is an advanced IDS System

Answer- False

  1. Attempting to attract intruders to a system setup for monitoring is called?

Answer- Intrusion banishment

  1. A profiling technique that monitors how applications use resources is called?

Answer- Executable profiling

  1. What is another term for preemptive blocking?

Answer-Banishment vigilance  

Part 5: Fundamentals of Encryption

  1. Which of the following is the symmetric key system using blocks?

Answer- DES

  1. Blowfish is an asymmetric stream cipher

Answer- False

  1. Which encryption algorithm uses a variable length symmetric key?

Answer-Blowfish

  1. Which of the following is an encryption method developed by three mathematicians?

Answer-RSA

  1. Which hashing algorithm do modern windows system use?

Answer-NTLM

  1. What is a digital signature?

Answer- A piece of encrypted data added to other data to verify the sender

  1. What is the purpose of a certificate?

Answer- To validate the sender of a digital signature or software

  1. Which of the following encryption algorithms is a block cipher and uses the Rijndael algorithm?

Answer- AES

  1. Which of the following uses key sizes equal to 128, 192 and 256 bits?

Answer-AES

  1. Secure Multipurpose Internet Mail Extensions (S/MIME) use X.509 certificates to secure e-mail communication

Answer-True

Part 6: Virtual Private Networks (VPN)

  1. The ESP Protocol provides data confidentiality and authentication.

Answer- True

  1. Which of the following is an important security feature in CHAP

Answer- It periodically re-authenticates

  1. Which authentication protocols are available under PPTP?

Answer- EAP,CHAP

  1. Which of the following is generally considered the least secure?

Answer- PAP

  1. What is the purpose of IKE?

Answer- Key exchange

  1. Which of the following is a weakness in PPTP?

Answer- No encryption

  1. Openswan is a VPN solution provided by CISCO.

Answer- False

  1. PPTP is based on which protocol?

Answer- PPP

  1. PPTP is an acronym for which of the following?

Answer- Point-to-Point Tunneling Protocol

  1. What does L2TP stand for?

Answer- Layer 2 Tuneling Protocol

Part 7: Operating System Hardening

  1. Which of the following best describes the registry

Answer- A database containing system settings

  1. What account lockout threshold does the NSA recommends?

Answer- 3 tries

  1. The command sudo find/-perm -4000 checks for the location of suid binaries

Answer- True

  1. What minimum password length does the NSA recommends?

Answer- 12

  1. What level of privileges all users must have?

Answer- Least possible

  1. What maximum password age does Microsoft recommend?

Answer- 42 days

  1. What type of encryption does EFS utilize?

Answer-Public key encryption

  1. What is the rule for unused services on any computer?

Answer- Turn them off

  1. A Linux system has a repository of packages available to be installed on the system

Answer- True

  1. What operating system requires periodic patches?

Answer- All

To get full access to the pdf file
Note: The pdf file contains over 200+ questions and it goes for  NGN(₦) 3000

 

Make Payment here: https://switchwebstudio.com/payment-page/

 

Ensure the form is filled correctly as pdf will be sent to your email address. For enquires: Contact us: https://switchwebstudio.com/contact-us/

Top 10 Skills to Learn during COVID-19

To Software Developers, This is the time to widen your Skills during COVID-19. This article is not only for software developers but to anyone willing to improve oneself.

Dear Software Developers,

As a family, it is our duty to check up on you, especially in unprecedented and uncertain times like this.

In spite of the novel Coronavirus disease (COVID-19) outbreak across the globe, we want you to stay positive in this period while adhering to the recommended health advice and best practices to combat the disease.

Our default response to the outbreak is to soar above the circumstances. However, we understand that people are navigating this season in various ways and so we ask that we support one another as we journey through the storms of this pandemic.

Health Advice
We are fully aligned with the health advice prescribed and published by the World Health Organisation (WHO) and other recognised health bodies.

As you adhere to these health guidelines, please also look out for and fully comply with instructions from the government of your current location particularly during this period.
Now let’s look at the top Skills to learn in this period.

Skills to learn as you work home
1. SQL 
SQL is a domain-specific language used in programming and designed for managing data held in a relational database management system, or for stream processing in a relational data stream management system.

What is SQL?

  • SQL stands for Structured Query Language
  • SQL lets you access and manipulates databases

What Can SQL do?

  • SQL can execute queries against a database
  • SQL can retrieve data from a database
  • SQL can insert records in a database
  • SQL can update records in a database
  • SQL can delete records from a database
  • SQL can create new databases
  • SQL can create new tables in a database
  • SQL can create stored procedures in a database
  • SQL can create views in a database
  • SQL can set permissions on tables, procedures, and views

2. Java 
Java is a general-purpose programming language that is class-based, object-oriented, and designed to have as few implementation dependencies as possible. … Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of the underlying computer architecture.
Java is used for:

  • Mobile applications (especially Android apps)
  • Desktop applications
  • Web applications
  •  Web servers and application servers
  • Games
  • Database connection

Why Use Java?

  • Java works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc.)
  • It is one of the most popular programming languages in the world
  • It is easy to learn and simple to use
  • It is open-source and free
  • It is secure, fast and powerful
  • It has huge community support (tens of millions of developers)
  • Java is an object-oriented language which gives a clear structure to programs and allows code to be reused, lowering development costs

As Java is close to C++ and C#, it makes it easy for programmers to switch to Java or vice versa

3. Python 
Python is an interpreted, high-level, general-purpose programming language. … It supports multiple programming paradigms, including procedural, object-oriented, and functional programming. Python is often described as a “batteries included” language due to its comprehensive standard library.
Python is used for:

  • Web development (server-side)
  • Software development
  • Mathematics
  • System scripting.

What can Python do?

  • Python can be used on a server to create web applications.
  • Python can be used alongside software to create workflows.
  •  Python can connect to database systems. It can also read and modify files.
  • Python can be used to handle big data and perform complex mathematics.
  • Python can be used for rapid prototyping, or for production-ready software development.

Why Python?

  • Python works on different platforms (Windows, Mac, Linux, Raspberry Pi, etc).
  • Python has a simple syntax similar to the English language.
  • Python has a syntax that allows developers to write programs with fewer lines than some other programming languages.
  • Python runs on an interpreter system, meaning that code can be executed as soon as it is written. This means that prototyping can be very quick.
  • Python can be treated in a procedural way, an object-orientated way or a functional way.

Good to know: The most recent major version of Python is Python 3, which we shall be using in this tutorial. However, Python 2, although not being updated with anything other than security updates, is still quite popular.

4. Advanced excel

Advanced Excel refers to features and functions of Microsoft Excel tool which helps the user to perform complex and large calculations, data processing on the huge amount of data, performing data analysis, better representation of data, etc.
Build a strong foundation in Excel for careers in:

  •  Investment banking
  • Private equity
  • Corporate development
  • Equity research
  • Financial Planning & Analysis (FP&A)

5. Power BI
Power BI is a business analytics service by Microsoft. It aims to provide interactive visualizations and business intelligence capabilities with an interface simple enough for end users to create their own reports and dashboards. Power BI suite provides multiple software, connector, and services – Power BI desktop, Power BI service based on Saas, and mobile Power BI apps available for different platforms. These sets of services are used by business users to consume data and build BI reports. This tutorial covers all the important concepts in Power BI and provides a foundational understanding of how to use Power BI.

6. Telemarketing

Telemarketing is a method of direct marketing in which a salesperson solicits prospective customers to buy products or services, either over the phone or through a subsequent face to face or web conferencing appointment scheduled during the call.
Why use Telemarketing
Telemarketing can help a wide variety of organizations achieve improved results in different ways. Though the most obvious form of telemarketing involves company calls to individuals at home to pitch them products, telemarketing is also a significant strategy in business-to-business sales, event promotion, political campaigning, and lead generation for more sophisticated sales procedures.

7. Content writing skills for bloggers
A Website content writer or web content writer is a person who specializes in providing relevant content for websites. Every website has a specific target audience and requires the most relevant content to attract business. Content should contain keywords aimed towards improving a website’s SEO
15 Tips for Writing Web Content

  • Always start with keyword research for SEO.
  • Keyword stuffing is never okay
  • Drive toward powerful calls to action
  • Email vs. e-mail, Internet vs. internet and other style debates
  • Always hyperlink to your sources
  • Make the reader feel something.
  • Keep the action in your content writing
  • When writing for the web, chop it up.
  • Update your links
  • Invest in a good SEO suite 
  • Don’t forget SEO best practices
  • Give your readers a reason to care from the first sentence
  • Paint a picture
  • “Do’s and Don’t’s” vs. “Dos and Don’ts” — which is correct?
  • If you’re not sure, look it up at dictionary.com

8. Big Data

Big data is a field that treats ways to analyze, systematically extract information from, or otherwise, deal with data sets that are too large or complex to be dealt with by traditional data-processing application software.
What is Big Data Technology?

Big Data Technology can be defined as a Software-Utility that is designed to Analyse, Process and Extract the information from an extremely complex and large data set which the Traditional Data Processing Software could never deal with. In most big data circles, these are called the four V’s: volume, variety, velocity, and veracity. (You might consider a fifth V, value.)

9. Business Development Skills
Business development is the creation of long-term value for an organization from customers, markets, and relationships. Business development can be taken to mean any activity by either a small or large organization, a non-profit or for-profit enterprise that serves the purpose of ‘developing’ the business in some way.
Skills you must learn if you want to be a business developer

  1. Sales
  2. Marketing
  3. Partnership
  4. Strategic Initiative 
  5. Project Management 
  6. Negotiation
  7. Networking
  8. Cost Saving

In essence, business development involves high-level decision-making based on a realistic assessment of all potential changes and their impact. Through new ideas and initiatives, it aims to improve the overall business prospects, which drive the functioning of the different business units. It is not sales; it is not marketing; it is not partnering. Instead, it is the eco-system encompassing the entire business and its various divisions, driving overall growth.

10. Artificial Intelligence
(AI) is the branch of computer sciences that emphasizes the development of intelligent machines, thinking and working like humans. For example, speech recognition, problem-solving, learning and planning.
You need to brush up with these skills so as to be the best when you resume your work. You can also learn the tools you need when you work from home.

During this period, Protect yourself by
Watch the video: https://youtu.be/8c_UJwLq8PI

 Skills to Learn during COVID-19
Skills to Learn during COVID-19

1. Washing your hands frequently
2. Avoid touching your eyes, mouth and nose
3. Covering your mouth and nose with your bent elbow or tissue when you cough or sneeze
4. Avoid crowded places
5. Stay at home if you feel unwell – even with a slight fever and cough
6. If you have a fever, cough and difficulty breathing, seek medical care early – but call by phone first
7. Stay aware of the latest information from WHO

⏩ Share this service with this link: http://bit.ly/who-covid-19-share

10 Reasons Clients hates Software Developers

5 Best WordPress Email Marketing Plugins : Free

What Is The Difference Between a Child Theme and a Premium Divi Child Theme

Basic Shortcut keys in Computer

Knowing a computer shortcut keys makes your work faster and easier.

Alt + F :-File menu options in current program
Alt + E :-Edit options in current program
F1 :-Universal help (for all programs)
Ctrl + A :-Select all text
Ctrl + X :-Cut selected item
Shift + Del :-Cut selected item
Ctrl + C :-Copy selected item
Ctrl + Ins :-Copy selected item
Ctrl + V :-Paste
Shift + Ins :-Paste
Home Go to beginning of current line
Ctrl + Home :-Go to beginning of document
End Go to end of current line
Ctrl + End :-Go to end of document
Shift + Home :-Highlight from current position to beginning of line
Shift + End :-Highlight from current position to end of line
Ctrl + f :-Move one word to the left at a time
Ctrl + g :-Move one word to the right at a time

MICROSOFT WINDOWS SHORTKEYS

Alt + Tab :-Switch between open applications
Alt +
Shift + Tab:-
Switch backwards between open
applications
Alt + Print:-
Screen Create screen shot for current program
Ctrl + Alt + Del :-Reboot/Windows® task manager
Ctrl + Esc:- Bring up start menu
Alt + Esc :-Switch between applications on taskbar
F2 :-Rename selected icon
F3 :-Start find from desktop
F4 :-Open the drive selection when browsing
F5 :-Refresh contents
Ctrl +F12 :- Inspect a webpage
Alt + F4 :-Close current open program
Ctrl + F4 :-Close window in program
Ctrl + Plus:-
Key
Automatically adjust widths of all columns
in Windows Explorer
Alt + Enter :-Open properties window of selected icon
or program
Shift + F10 :-Simulate right-click on selected item
Shift + Del :-Delete programs/files permanently

Note:-Holding Shift
During Bootup Boot safe mode or bypass system files
Holding Shift
During Bootup
When putting in an audio CD, will prevent
CD Player from playing

WINKEY SHORTCUTS
WINKEY + D :-Bring desktop to the top of other windows
WINKEY + M :-Minimize all windows
WINKEY +
SHIFT + M:-
Undo the minimize done by WINKEY + M
and WINKEY + D
WINKEY + E :-Open Microsoft Explorer
WINKEY + Tab :-Cycle through open programs on taskbar
WINKEY + F :-Display the Windows® Search/Find feature
WINKEY +
CTRL + F :-Display the search for computers window
WINKEY + F1 :-Display the Microsoft® Windows® help
WINKEY + R :-Open the run window
WINKEY +:-
Pause /Break Open the system properties window
WINKEY + U :-Open utility manager
WINKEY + L :-Lock the computer (Windows XP® & later)

OUTLOOK® SHORTCUT KEYS
Alt + S :-Send the email
Ctrl + C :-Copy selected text
Ctrl + X :-Cut selected text
Ctrl + P :-Open print dialog box
Ctrl + K :-Complete name/email typed in address bar
Ctrl + B :-Bold highlighted selection
Ctrl + I :-Italicize highlighted selection
Ctrl + U :-Underline highlighted selection
Ctrl + R :-Reply to an email
Ctrl + F :-Forward an email
Ctrl + N :-Create a new email
Ctrl + Shift + A :-Create a new appointment to your calendar
Ctrl + Shift + O :-Open the outbox
Ctrl + Shift + I :-Open the inbox
Ctrl + Shift + K :-Add a new task
Ctrl + Shift + C :-Create a new contact
Ctrl + Shift+ J :-Create a new journal entry

WORD® SHORTCUT KEYS
Ctrl + A :-Select all contents of the page
Ctrl + B :-Bold highlighted selection
Ctrl + C :-Copy selected text
Ctrl + X :-Cut selected text
Ctrl + N :-Open new/blank document
Ctrl + O :-Open options
Ctrl + P :-Open the print window
Ctrl + F :-Open find box
Ctrl + I :-Italicize highlighted selection
Ctrl + K :-Insert link
Ctrl + U :-Underline highlighted selection
Ctrl + V :-Paste
Ctrl + Y :-Redo the last action performed
Ctrl + Z :-Undo last action
Ctrl + G :-Find and replace options
Ctrl + H :-Find and replace options
Ctrl + J :-Justify paragraph alignment
Ctrl + L :-Align selected text or line to the left
Ctrl + Q :-Align selected paragraph to the left
Ctrl + E :-Align selected text or line to the center
Ctrl + R :-Align selected text or line to the right
Ctrl + M :-Indent the paragraph
Ctrl + T :-Hanging indent
Ctrl + D :-Font options
Ctrl + Shift + F :-Change the font
Ctrl + Shift + > :-Increase selected font +1
Ctrl + ] :-Increase selected font +1
Ctrl + Shift + < :-Decrease selected font -1
Ctrl + [ :- Decrease selected font -1
Ctrl + Shift + * :-View or hide non printing characters
Ctrl + f :-Move one word to the left
Ctrl + g :-Move one word to the right
Ctrl + h :-Move to beginning of the line or paragraph
Ctrl + i :-Move to the end of the paragraph
Ctrl + Del :-Delete word to right of cursor
Ctrl + Backspace :-Delete word to left of cursor
Ctrl + End :-Move cursor to end of document
Ctrl + Home :-Move cursor to beginning of document
Ctrl + Space :-Reset highlighted text to default font
Ctrl + 1 :-Single-space lines
Ctrl + 2 :-Double-space lines

Read on

Deborah Sodiya, BetteredbyPEYI Blogger

Software Engineering Jobs Around MeGO
+ +