Last Updated on September 20, 2021 by Admin 2

312-38 : Certified Network Defender : Part 19

  1. What is the technique used in the cost estimates for the project during the design phase of the following? Each correct answer represents a complete solution. Choose all that apply.

    • expert assessment
    • The Delphi technique
    • Function point analysis
    • Program Evaluation Technique (PERT)
  2. Which of the following is a management process that provides a framework to stimulate a rapid recovery, and the ability to react effectively to protect the interests of its brand, reputation and stakeholders?

    • None
    • log analysis
    • Business Continuity Management
    • patch management
    • response systems
  3. You just set up a wireless network to customers in the cafe. Which of the following are good security measures implemented? Each correct answer represents a complete solution. Choose all that apply.

    • WEP encryption
    • WPA encryption
    • Not broadcasting the SSID
    • The MAC-filtering router
  4. What is needed for idle scan a closed port the next steps? Each correct answer represents a part of the solution. Choose all that apply.

    • Zombie ignores unsolicited RST, and IP ID remains unchanged.
    • The attacker sends a SYN/ACK zombie.
    • In response to the SYN, the target to send RST.
    • Zombie IP ID will increase by only 1.
    • Zombie IP ID 2 rises.
  5. Which of the following is a mechanism that helps to ensure that only the intended and authorized recipients are able to read the data?

    • access to information
    • none
    • integrity
    • authentication
    • confidence
  6. Which of the following attacks, the attacker cannot use the software, which is trying a number of key combinations in order to obtain your password?

    • Buffer overflow
    • Zero-day attack
    • Smurf attack
    • None
    • Shock brutal force
  7. Which of the following policies to help define what users can and should do to use the network and organization of computer equipment?

    • None
    • IT policy
    • user policy
    • general policy
    • remote access policy
  8. Which of the following is a class of attacks to break through, which depends on a greater probability of collisions between random attack was detected, and try to fixed rate permutations?

    • Dictionary attack
    • None
    • birthday attack
    • phishing attack
    • replay attack
  9. Which of the following offer “always-on” Internet service for connecting to your ISP? Each correct answer represents a complete solution. Choose all that apply.

    • analog modem
    • digital modem
    • DSL
    • cable modem
  10. The attacks are classified as which of the following? Each correct answer represents a complete solution. Choose all that apply.

    • replay attack
    • active attack
    • session hijacking
    • passive attack
  11. Which of the following routing metrics refers to the time required to transfer the package to the source via the Internet?

    • None
    • routing delay
    • length of the trail
    • charge
    • bandwidth
  12. Which of the following is a kind of security, which deals with the protection of false signals transmitted by the electrical system?

    • None
    • emanation Safety
    • hardware security
    • physical security
    • communications Security
  13. John works Incident Director of Tech World Inc. His job is to set up a wireless network in his organization. For this purpose, he needs to decide on appropriate equipment and policies need to set up a network. Which of the following stages of the incident handling process to help him accomplish the task?

    • Preparation
    • None
    • Recovery
    • the eradication of
    • containment
  14. You are using more than the safety of the existing network. You’ll find a machine that is not in use as such, but is a software that emulates the operation of a sensitive database server. What is this?

    • The reactive IDS
    • Honey Pot
    • None
    • Virus
    • The polymorphic virus
  15. Which of the following router configuration modes to change the terminal settings temporarily, perform basic tests, and lists the system information?

    • None
    • UI Config
    • user EXEC
    • Global Config
    • the privileged EXEC
  16. Which of the following is a worldwide organization whose mission is to create, refine and promote internet safety standards?

    • None
    • SPROUT
    • ANSI
    • IEEE
    • WASC
  17. Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.

    • It uses a longer subnet masks as those used for IPv4.
    • The interoperability, the IPv4 addresses using the last 32 bits of the IPv6 address.
    • It provides enhanced authentication and security.
    • It uses 128-bit addresses.
    • It’s more of available IP addresses.
  18. Which of the following types of coaxial cable used for cable television and cable modems?

    • RG-8
    • RG-59
    • RG-58
    • None
    • RG-62
  19. Which of the following are valid steps to secure routers? Each correct answer represents a complete solution. Choose all that apply.

    • Keep routers updated with the latest security updates.
    • Use a password that is easy to remember the router’s administrative console.
    • Configure access list entries to prevent unauthorized connections and routing.
    • Use a complex password of the router management console.
  20. Each of the following is a network layer protocol used for a particular (MAC) address to obtain an IP address?

    • ARP
    • None
    • RARP
    • P.M
    • PIM