Last Updated on September 20, 2021 by Admin 2

312-38 : Certified Network Defender : Part 18

  1. Which of the following tools is an open source network intrusion prevention and detection system that works network sniffer and record the operation of the network, which is coordinated pre-signatures?

    • dsniff
    • kismet
    • None
    • KisMAC
    • bridle
  2. Which of the following statements best describes the consequences of a disaster recovery test?

    • None
    • The test results should be kept secret.
    • If no deficiencies were found during the test, so the plan is probably perfect.
    • If no deficiencies were found during the test, the test was probably erroneous.
    • The plan should not change any of the test results would be.
  3. Which of the following flag to set whether the scan sends TCP Christmas tree frame with the remote machine? Each correct answer represents a part of the solution. Choose all that apply.

    • FIN
    • URG
    • RST
    • PUSH
  4. What is used for drawing symbols in public places following techniques of advertising an open Wi-Fi network?

    • wardriving
    • None
    • spam
    • war call
    • warchalking
  5. Which of the following firewalls are used to monitor the status of active connections, and configure the network packets to pass through the firewall? Each correct answer represents a complete solution. Choose all that apply.

    • Farm owner
    • Proxy server
    • Dynamic packet filtering
    • The circuit gateway
  6. Which of the following conditions cannot enter the system ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.

    • The router does not find a valid operating system image.
    • The router does not have the configuration file.
    • The user interrupts the boot sequence.
    • It is necessary to set the operating parameters.
  7. You are Network Administrator Investment Bank. You’re worried about people breeching network and can steal information before you can detect and shut down access. Which of the following is the best way to deal with this issue?

    • To implement a strong firewall.
    • Implement a honey pot.
    • To implement a strong password policy.
    • None
    • To implement the network is based on antivirus.
  8. Which of the following steps OPSEC process examines every aspect of the proposed operation to identify the OPSEC indicators that can reveal important information and then compare them with indicators of the opponent’s intelligence collection capabilities identified in the previous activity?

    • Identification of Critical Information
    • analysis weakness
    • risk assessment
    • Appropriate OPSEC measures
    • analysis of threats
  9. Which of the following recovery plans include specific strategies and actions to address the specific variances assumptions lead to a particular safety problem or emergency situation?

    • Business Continuity Plan
    • disaster survival plan
    • None
    • The emergency plan
  10. Which of the following plans are documented and organized emergency backup operations and recovery operations maintained as part of the security program to ensure the availability of critical resources and facilitate the continuity of operations in case of emergency?

    • Business Continuity Plan
    • The emergency plan
    • None
    • disaster survival plan
  11. Which of the following standards have been proposed for the improvement of 802.11a and 802.11b wireless local area network (WLAN) specifications, which provides a quality of service (QoS) features, such as the prioritization of data, voice and video transmissions?

    • None
    • 802.15
    • 802.11h
    • 802.11n
    • 802.11e
  12. What are the responsibilities of the following disaster recovery team? Each correct answer represents a complete solution. Choose all that apply.

    • Monitor the implementation of a disaster recovery plan and evaluate the results.
    • To inform the management, the injured and the third parties about the disaster.
    • Amend and update the disaster recovery plan according to lessons learned from previous disaster recovery efforts.
    • Starts execution disaster recovery procedures.
  13. Which has the following fields IPv6 header is reduced by 1 for each router that sends a packet?

    • None
    • traffic class
    • hop limit
    • Next header
    • Flow label
  14. Which of the following tool is used for passive attacks to capture network traffic?

    • Intrusion prevention system
    • Intrusion detection system
    • Sniffer
    • warchalking
    • None
  15. Which of the following forms of recognition of the sender can inform the data receiver of all segments that have arrived successfully?

    • negative acknowledgment
    • the cumulative reset
    • with block
    • None
    • selective acknowledgment
  16. Which of the following is a communication protocol multicasts messages and information of all the member IP multicast group?

    • IGMP
    • ICMP
    • BGP
    • None
    • EGP
  17. Which of the following key features used by TCP to regulate the amount of data sent to the host machine to another network?

    • congestion control
    • flow control
    • None
    • TCP timestamp
    • SEQ ID NO:
  18. Which of the following is the standard protocol that provides VPN security at the highest level?

    • P.M
    • IPSec
    • PPP
    • None
    • L2TP
  19. Which of the following is a distance vector routing protocols? Each correct answer represents a complete solution. Choose all that apply.

    • OSPF
    • IGRP
    • IS-IS
    • REST IN PEACE
  20. Which of the following IP addresses is not reserved for the hosts? Each correct answer represents a complete solution. Choose all that apply.

    • E-Class
    • class D
    • class A
    • B-