Last Updated on September 20, 2021 by Admin 2
312-38 : Certified Network Defender : Part 19
What is the technique used in the cost estimates for the project during the design phase of the following? Each correct answer represents a complete solution. Choose all that apply.
- expert assessment
- The Delphi technique
- Function point analysis
- Program Evaluation Technique (PERT)
Which of the following is a management process that provides a framework to stimulate a rapid recovery, and the ability to react effectively to protect the interests of its brand, reputation and stakeholders?
- log analysis
- Business Continuity Management
- patch management
- response systems
You just set up a wireless network to customers in the cafe. Which of the following are good security measures implemented? Each correct answer represents a complete solution. Choose all that apply.
- WEP encryption
- WPA encryption
- Not broadcasting the SSID
- The MAC-filtering router
What is needed for idle scan a closed port the next steps? Each correct answer represents a part of the solution. Choose all that apply.
- Zombie ignores unsolicited RST, and IP ID remains unchanged.
- The attacker sends a SYN/ACK zombie.
- In response to the SYN, the target to send RST.
- Zombie IP ID will increase by only 1.
- Zombie IP ID 2 rises.
Which of the following is a mechanism that helps to ensure that only the intended and authorized recipients are able to read the data?
- access to information
Which of the following attacks, the attacker cannot use the software, which is trying a number of key combinations in order to obtain your password?
- Buffer overflow
- Zero-day attack
- Smurf attack
- Shock brutal force
Which of the following policies to help define what users can and should do to use the network and organization of computer equipment?
- IT policy
- user policy
- general policy
- remote access policy
Which of the following is a class of attacks to break through, which depends on a greater probability of collisions between random attack was detected, and try to fixed rate permutations?
- Dictionary attack
- birthday attack
- phishing attack
- replay attack
Which of the following offer “always-on” Internet service for connecting to your ISP? Each correct answer represents a complete solution. Choose all that apply.
- analog modem
- digital modem
- cable modem
The attacks are classified as which of the following? Each correct answer represents a complete solution. Choose all that apply.
- replay attack
- active attack
- session hijacking
- passive attack
Which of the following routing metrics refers to the time required to transfer the package to the source via the Internet?
- routing delay
- length of the trail
Which of the following is a kind of security, which deals with the protection of false signals transmitted by the electrical system?
- emanation Safety
- hardware security
- physical security
- communications Security
John works Incident Director of Tech World Inc. His job is to set up a wireless network in his organization. For this purpose, he needs to decide on appropriate equipment and policies need to set up a network. Which of the following stages of the incident handling process to help him accomplish the task?
- the eradication of
You are using more than the safety of the existing network. You’ll find a machine that is not in use as such, but is a software that emulates the operation of a sensitive database server. What is this?
- The reactive IDS
- Honey Pot
- The polymorphic virus
Which of the following router configuration modes to change the terminal settings temporarily, perform basic tests, and lists the system information?
- UI Config
- user EXEC
- Global Config
- the privileged EXEC
Which of the following is a worldwide organization whose mission is to create, refine and promote internet safety standards?
Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.
- It uses a longer subnet masks as those used for IPv4.
- The interoperability, the IPv4 addresses using the last 32 bits of the IPv6 address.
- It provides enhanced authentication and security.
- It uses 128-bit addresses.
- It’s more of available IP addresses.
Which of the following types of coaxial cable used for cable television and cable modems?
Which of the following are valid steps to secure routers? Each correct answer represents a complete solution. Choose all that apply.
- Keep routers updated with the latest security updates.
- Use a password that is easy to remember the router’s administrative console.
- Configure access list entries to prevent unauthorized connections and routing.
- Use a complex password of the router management console.
Each of the following is a network layer protocol used for a particular (MAC) address to obtain an IP address?