JOBSEEKERS
Login
Sign Up
Jobseeker
Employer
Staffing Firm
Direct Client
CCNP Security interview questions
CCNP Security interview questions
Back
Take as many assements as you can to improve your validate your skill rating
Total Questions: 5
1. Which statement describes phone freaking?
A. A hacker uses password-cracking programs to gain access to a computer via a dialup account.
B. A hacker gains unauthorized access to networks via wireless access points.
C. A hacker mimics a tone using a whistle to make free long-distance calls on an analog telephone network.
D. A hacker uses a program that automatically scans telephone numbers within a local area, dialing each one in search of computers, bulletin board systems, and fax machines.
Show Correct Answer
Correct Answer is :
A hacker mimics a tone using a whistle to make free long-distance calls on an analog telephone network.
2. Which two statements describe access attacks? (Choose two.)
A. Port redirection attacks use a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN.
B. Password attacks can be implemented using brute-force attack methods, Trojan Horses, or packet sniffers.
C. Trust exploitation attacks can use a laptop acting as a rogue access point to capture and copy all network traffic in a public location on a wireless hotspot.
D. Port scanning attacks scan a range of TCP or UDP port numbers on a host to detect listening services.
Show Correct Answer
Correct Answer is :
Password attacks can be implemented using brute-force attack methods, Trojan Horses, or packet sniffers.
3. Which type of software typically uses a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN?
A. Port scanner
B. Ping sweeper
C. Packet sniffer
D. Internet information query
Show Correct Answer
Correct Answer is :
Packet sniffer
4. 4 What are three goals of a port scan attack? (Choose three.)
A. Disable used ports and services
B. Determine potential vulnerabilities
C. Identify peripheral configurations
D.
Show Correct Answer
Correct Answer is :
Determine potential vulnerabilities
5. What is a ping sweep?
A. A ping sweep is a network scanning technique that indicates the live hosts in a range of IP addresses.
B. A ping sweep is a software application that enables the capture of all network packets sent across a LAN.
C. A ping sweep is a scanning technique that examines a range of TCP or UDP port numbers on a host to detect listening services.
D. A ping sweep is a query and response protocol that identifies information about a domain, including the addresses assigned to that domain.
Show Correct Answer
Correct Answer is :
A ping sweep is a network scanning technique that indicates the live hosts in a range of IP addresses.
Similar Interview Questions
Search for latest jobs
Find Jobs