Last Updated on September 20, 2021 by Admin 2

312-38 : Certified Network Defender : Part 16

  1. Which of the following is a centralized collection of honeypots and analysis tools?

    • Production honeypot
    • Honeynet
    • Research honeypot
    • Honeyfarm
  2. Which of the following routing metrics is the sum of the costs associated with each link traversed?

    • Routing delay
    • Communication cost
    • Bandwidth
    • Path length
  3. Which of the following honeypots is a useful little burglar alarm?

    • Backofficer friendly
    • Specter
    • Honeynet
    • Honeyd
  4. What is the location of honeypot on a network?

    • Honeyfarm
    • Honeynet
    • Hub
    • DMZ
  5. Which of the following is an open source implementation of the syslog protocol for Unix?

    • syslog-os
    • syslog Unix
    • syslog-ng
    • Unix-syslog
  6. Which of the following systems is formed by a group of honeypots?

    • Research honeypot
    • Honeyfarm
    • Honeynet
    • Production honeypot
  7. Which of the following protocols is a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and provides tunneling, address assignment, and authentication?

    • IP
    • L2TP
    • PPP
    • DHCP
  8. Which of the following sets of incident response practices is recommended by the CERT/CC?

    • Prepare, notify, and follow up
    • Notify, handle, and follow up
    • Prepare, handle, and notify
    • Prepare, handle, and follow up
  9. Which of the following tools scans the network systems for well-known and often exploited vulnerabilities?

    • Nessus
    • SAINT
    • SATAN
    • HPing
  10. Which of the following tools examines a system for a number of known weaknesses and alerts the administrator?

    • Nessus
    • COPS
    • SATAN
    • SAINT
  11. Which of the following is the full form of SAINT?

    • System Automated Integrated Network Tool
    • Security Admin Integrated Network Tool
    • System Admin Integrated Network Tool
    • System Administrators Integrated Network Tool
  12. Which of the following is a type of VPN that involves a single VPN gateway?

    • Remote-access VPN
    • Extranet-based VPN
    • PPTP VPN
    • Intranet-based VPN
  13. Which of the following is a free security-auditing tool for Linux?

    • SAINT
    • SATAN
    • Nessus
    • HPing
  14. Which of the following types of RAID is also known as disk striping?

    • RAID 0
    • RAID 2
    • RAID 1
    • RAID 3
  15. Which of the following is a process of transformation where the old system can no longer be maintained?

    • Disaster
    • Risk
    • Threat
    • Crisis
  16. Which of the following phases is the first step towards creating a business continuity plan?

    • Business Impact Assessment
    • Scope and Plan Initiation
    • Business Continuity Plan Development
    • Plan Approval and Implementation
  17. Which of the following is one of the most commonly used implementations of RAID?

    • RAID 2
    • RAID 3
    • RAID 1
    • RAID 5
  18. Which of the following types of RAID offers no protection for the parity disk?

    • RAID 2
    • RAID 1
    • RAID 5
    • RAID 3
  19. Which of the following processes helps the business units to understand the impact of a disruptive event?

    • Plan approval and implementation
    • Business continuity plan development
    • Scope and plan initiation
    • Business impact assessment
  20. Which of the following is a network analysis tool that sends packets with nontraditional IP stack parameters?

    • Nessus
    • COPS
    • SAINT
    • HPing