Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

NSA CNT Exam with precise detailed answers, Exams of Information and Computer Technology

NSA CNT Exam with precise detailed answers

Typology: Exams

2024/2025

Available from 07/05/2025

smart-scores
smart-scores šŸ‡ŗšŸ‡ø

5

(2)

7K documents

1 / 40

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1 |! / |! 40
NSA |! CNT |! Exam |! with |! precise |! detailed |!
answers
1. Computer |! Concepts |! - |! Endianness: |! Endianness |! means |! that |! the |! bytes |! in |!
com- |! puter |! memory |! are |! read |! in |! a |! certain |! order
- If |! my |! computer |! reads |! bytes |! from |! left |! to |! right |! and |! your |! computer |! reads |! from |!
right |! to |! left |! were |! going |! to |! have |! issues |! communicating
2. Endianness |! is |! represented |! in |! two |! ways |! what |! are |! they?: |! Big-endian |! (BE) |! and
|! Little |! Endian |! (LE)
3. Big-Endian |! (BE) |! vs |! Little-Endian |! (LE): |! BE |! stores |! the |! big |! end |! first |! and |!
then |! proceeds |! to |! the |! lowest, |! from |! left |! to |! right
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28

Partial preview of the text

Download NSA CNT Exam with precise detailed answers and more Exams Information and Computer Technology in PDF only on Docsity!

1 |! / |! 40

NSA|! CNT|! Exam|! with|! precise |! detailed |!

answers

  1. Computer |! Concepts |! - |! Endianness: |! Endianness |! means |! that |! the |! bytes |! in |! com- |! puter |! memory |! are |! read |! in |! a |! certain |! order
  • If|! my|! computer|! reads|! bytes|! from|! left|! to|! right|! and|! your|! computer|! reads|! from|! right|! to |! left |! were |! going |! to |! have |! issues |! communicating
  1. Endianness |! is |! represented |! in |! two |! ways |! what |! are |! they?: |! Big-endian |! (BE) |! and |! Little |! Endian |! (LE)
  2. Big-Endian |! (BE) |! vs |! Little-Endian |! (LE): |! BE |! stores |! the |! big |! end |! first |! and |! then |! proceeds |! to |! the |! lowest, |! from |! left |! to |! right

2 |! / |! 40 LE |! stores |! the |! little |! end |! first.|! from |! right |! to |! left

  1. What |! are |! the |! different |! types |! of |! CPU |! architectures?: |! ia32 |! - |! 32-bit |! intel |! Archi- |! tecture mipsel |! - |! 64 |! bit |! Microprocessor 32 |! and |! 64 |! bit |! systems
  2. What |! is |! Virtualization: |! is |! a |! process |! that |! allows |! for |! more |! efficient |! utilization |! of |! physical |! computer |! hardware |! and |! is |! the |! foundation |! of |! cloud |! computing
  3. What |! are |! some |! benefits |! of|! Virtualization?: |! Resource |! Efficiency Easier|! Management |!

4 |! / |! 40 User|! Space:|! User|! applications|! operate|! in|! a|! less|! privileged|! mode,|! typically|! at|! a|! lower |! privilege |! level |! then |! the |! kernel

5 |! / |! 40

  1. Access|! to|! Resources |! Kernel |! Space: User |! Space:: |! Kernel |! Space |! - |! the |! kernel |! has |! direct |! access |! to |! all |! hardware |! and |! system |! resources User |! Space:|! user |! applications |! do |! not |! have |! direct |! access |! to |! hardware |! resources. |! They |! interact |! with |! the |! system |! through |! system |! calls |! provided |! by |! the |! kernel
  2. Execution |! Context |! Kernel |! Space: User |! Space:: |! Kernel |! Space:|! the |! kernel |! runs |! in |! a |! global |! and |! shared |! context, |! and |! its |! code |! is |! typically |! loaded |! into |! a |! fixed |! location |! in |! memory |! during |! system |!

7 |! / |! 40

  1. Viruses |! and |! there |! Key |! Features:|! - |! Infects |! other |! executable|! files |! or |! documents
  • Spreads |! when |! infected |! files |! are |! shared |! or |! executed
  • Often |! requires |! user |! interaction |! to |! propagate
  1. Worms |! and |! there |! Key|! Features:|! - |! Self|! replicates|! and|! spreads|! across|! networks |! without |! user |! intervention -Exploits |! vulnerabilities |! in |! network |! protocols |! or |! operating |! systems
  • Can |! consume |! network |! bandwidth |! and |! system |! resources
  1. Trojan |! Horses |! and |! there |! Key |! Features:|! - |! Disguises |! itself |! as |! a |! legitimate |! or |! benign |! program
  • Tricks |! users |! into |! executing|! or |! installing |! it

8 |! / |! 40

  • Can |! create |! backdoors |! for |! remote |! access
  1. Spyware |! and |! there |! Key |! Features:|! - |! Secretly |! monitors |! user |! activities |! without |! their |! knowledge
  • Collects |! sensitive |! information |! such |! as |! login |! credentials |! or |! browsing |! habits
  • Often |! used |! for |! identity |! theft |! or |! espionage
  1. Adware |! and |! there |! Key|! Features:|! - |! Displays|! unwanted|! advertisements|! to|! users
  • May |! come |! bundled |! with |! legitimate |! software

10 |! / |! 40 normal |! behavior |! making |! it |! possible |! to |! detect |! and |! mitigate |! malware

  1. What |! is |! Signature |! based |! detection |! for |! malware?: |! uses |! a |! unique |! signature |! or |! digital |! footprint |! from |! software |! programs |! running |! on |! a |! protected |! system.|! Antivirus |! programs|! scan|! the|! software|! and|! compare|! the|! signature|! to|! know|! malware|! signatures
  2. What |! are |! the |! different |! types |! of |! rootkits: |! User |! Mode |! Rootkits |! Kernel |! Mode |! Rootkits Bootkits Memory-Resident |! or |! RAM-based |! rootkits
  3. **What |! is |! a |! User |! Mode |! Rootkit
  4. |! Privilege |! Level**

11 |! / |! 40 2, |! Infection |! Method

3. |! Detection |! Method: |! Privilege |! Level:|! Operate |! at |! the |! user |! level Infection |! method |! - |! typically |! infiltrate |! user-space |! processes |! and |! applications Detection |! Method |! - |! may |! be |! detected |! using |! rootkit |! scanners, |! behavioral |! analysis, |! or |! by |! monitoring |! changes |! in |! system |! files |! and |! registry |! entries

  1. **What |! is |! a |! Kernel |! Mode |! Rootkit?
  2. |! Privilege |! Level 2, |! Infection |! Method
  3. |! Detection |! Method: |!** 1.|! Privilege |! Level:|! Operate |! at |! the |! kernel |! or |! ring |! 0 |! level 2.|! Infection|! Method:|! invade|! the|! core|! of|! the|! operating|! system,|! replacing|! or|! modifying |! kernel |! components

13 |! / |! 40

  1. **What |! is |! a |! Bootkits |! Rootkit?
  2. |! Privilege |! Level 2, |! Infection |! Method 3.|! Detection |! Method: |!** 1.|! Privilege|! Level|! - |! Operate|! at|! the|! bootloader|! level,|! before|! the |! operating |! system |! loads 2, |! Infection|! Method|! - |! Modify|! the|! master|! boot|! record|! (MBR)|! or|! other|! boot|! components |! to |! gain |! control |! during |! the |! boot |! process 3.|! Detection |! Method |! - |! Bootkit |! detection |! often |! requires |! specialized |! tools |! that |! can |! analyze |! the |! boot |! process
  3. What |! is |! a |! Memory-Resident |! or |! RAM-Based |! Rootkit?

14 |! / |! 40

**1. |! Privilege |! Level 2, |! Infection |! Method

  1. |! Detection |! Method: |!** 1.|! Privilege |! Level |! - |! Operate |! in |! the |! system's |! memory 2, |! Infection |! Method |! - |! Load |! directly |! into |! RAM, |! making |! detection |! more |! challenging 3.|! Detection |! Method |! - |! Memory |! analysis |! tools |! and |! behavioral |! monitoring |! can |! help |! identify |! anomalies |! in |! system |! memory.
  2. Which|! type|! of|! virtualization|! allows|! a|! computer's|! operating|! system|! kernel|! to |! run |! multiple |! isolated |! instances |! of |! a |! guest |! virtual |! machine, |! with |! each |! guest |! sharing |! the |! kernel?: |! Container |! Virtualization
  3. What |! is |! SSH? |! What |! port |! does |! it |! use?: |! Secure |! Shell |! (SSH) |! can |! be |! used |! to |!

16 |! / |! 40

  1. What|!is|!HTTP|!and|!what|!port|!does|!it|!use?:|! HTTP|!is|!HyperText|!Transfer|!Proto-|! col |!and|!it|!is|!responsible|!for|!web|!content.|!Many|!web|!pages|!use|!HTTP|!to|!transmit|!the |! web |! content |! and |! allow |! the |! display |! and |! navigation |! of |! HyperText. TCP |! Port:|! 80
  2. What |! is |! Telnet |! and |! what |! port |! does |! it |! use?:|! TCP |! Port:|! 23 Command|! line|! tool|! to|! access|! a|! remote|! system.|! Used|! to|! configure|! a|! router|! or|! switch. |! Can |! be |! also |! used |! to |! check |! if |! ports |! are |! open |! or |! closed Not |! secure, |! don't |! use |! over |! the |! internet
  3. What|! is|! FTP|! and|! what|! port|! does|! it|! use:|! File|!Transfer|!Protocol|!is|!used|!to|!upload

17 |! / |! 40 |! and |! download |! files |! from |! an |! FTP |! server. FTP |! uses |! ports|! TCP |! 20 |! & |! 21

  1. What |! is |! DNS |! and |! what |! port |! does |! it |! use: |! Domain |! Name |! System |! is |! used |! to |! resolve|! host|! names|! to|! IP|! addresses.|! DNS|! servers|! host|! the|! DNS|! service|! and|! respond |! to |! DNS |! queries. DNS |! uses |! UDP |! port |! 53.
  2. What |! is |! DHCP |! and |! what |! port |! does |! it |! use?:|! Dynamic |! Host |! Configuration |! Protocol Automatically |! sets |! IP |! addresses |! and |! other |! attributes |! to |! an |! IP |! host |! to |! enable |! infor- |! mation |! transfer |! between |! network |! nodes

19 |! / |! 40

  1. netstat |! -a |! what |! does |! it |! show: |! Shows |! all |! active |! ports |! open
  2. TCP/IP |! 3-way |! handshake: |! SYN |! - |! Host |! A |! sends |! request |! to |! Host |! B |! SYN/ACK |! - |! Host |! B |! sends |! back |! a |! ACK |! of |! Host |! A's |! SYN |! and |! its |! on |! SYN |! as |! well ACK |! - |! Host |! A |! ACK
  3. By|! default, |! what |! is |! the|! MTU|! size |! on |! a|! typical |! Ethernet |! network?: |! 1500 |! bytes
  4. ARP |! Tables |! might |! contain |! two |! different |! types |! of|! entries. |! What |! are|! they, |! and |! how |! are |! they |! created?: |! They |! contain |! dynamic |! and |! static |! entries. Dynamic |! ARP |! table |! entries |! are |! created |! when |! a |! client |! makes |! an |! ARP |! request |! for |! information |! that |! could |! not |! be |! satisfied |! by |! data |! already |! in |! the |! ARP |! table,

20 |! / |! 40 Static |! ARP |! table |! entries |! are |! those |! that |! someone |! has |! entered |! manually |! using |! the |! ARP |! utility

  1. How|! is |! TTL|! field |! utilized |! in|! IPv4: |! the|! TTL|! field|! indicates|! the|! maximum|! duration |! that |! the |! packet |! can |! remain |! on |! the |! network |! before |! it |! is |! discarded. it |! represents |! the |! number |! of |! times |! a |! packet |! can |! still |! be |! forwarded |! by |! a |! router, |! or |! the |! maximum |! number |! of |! router |! hops |! it |! has |! remaining.The |! TTL |! for |! packets |! varies |! and |! can |! be |! configured;|! it |! is |! usually |! set |! at |! 32 |! or |! 64.|! Each |! time |! a |! packet |! passes |! through |! a |! router, |! its|! TTL |! is |! reduced |! by |! 1.|! When |! a |! router |! receives |! a |! packet |! with |! a|! TTL |! equal |! to|! 0,|! it|! discards|! that|! packet|! and|! sends|! a|! TTL |! expired|! message|! via|! ICMP|! back|! to|! the |! source |! host.
  2. IP |! is |! an |! unreliable, |! connectionless |! protocol, |! as |! it |! does |! not |! establish |! a |!