Certbus > EC-COUNCIL > Certified Ethical Hacker > 312-38 > 312-38 Online Practice Questions and Answers

312-38 Online Practice Questions and Answers

Questions 4

Fill in the blank with the appropriate term. is a prime example of a high-interaction honeypot.

Browse 653 Q&As
Questions 5

Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?

A. SuperScan

B. Netscan

C. Hping

D. Nmap

Browse 653 Q&As
Questions 6

Which of the following networks interconnects devices centered on an individual person's workspace?

A. WLAN

B. WPAN

C. WWAN

D. WMAN

Browse 653 Q&As
Questions 7

Which of the following encryption techniques do digital signatures use?

A. MD5

B. RSA

C. Blowfish

D. IDEA

Browse 653 Q&As
Questions 8

Which of the following phases is the first step towards creating a business continuity plan?

A. Business Impact Assessment

B. Scope and Plan Initiation

C. Business Continuity Plan Development

D. Plan Approval and Implementation

Browse 653 Q&As
Questions 9

What is the technique used in the cost estimates for the project during the design phase of the following? Each correct answer represents a complete solution. Choose all that apply.

A. expert assessment

B. The Delphi technique

C. Function point analysis

D. Program Evaluation Technique (PERT)

Browse 653 Q&As
Questions 10

A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. What IP address class is the network range a part of?

A. Class C

B. Class A

C. Class B

D. Class D

Browse 653 Q&As
Questions 11

Which of the following security models enable strict identity verification for every user or device attempting to access the network resources?

I. Zero-trust network model

II.

Castle-and-Moat model

A.

Both I and II

B.

I only

C.

II only

D.

None

Browse 653 Q&As
Questions 12

Which of the following helps in viewing account activity and events for supported services made by AWS?

A. AWS CloudFormation

B. AWS Certificate Manager

C. AWS CloudHSM

D. AWS CloudTrial

Browse 653 Q&As
Questions 13

Which of the following things need to be identified during attack surface visualization?

A. Attacker's tools, techniques, and procedures

B. Authentication, authorization, and auditing in networks

C. Regulatory frameworks, standards and, procedures for organizations

D. Assets, topologies, and policies of the organization

Browse 653 Q&As
Questions 14

How can one identify the baseline for normal traffic?

A. When the SYN flag appears at the beginning and the FIN flag appears at the end of the connection

B. When the RST flag appears at the beginning and the ACK flag appears at the end of the connection

C. When the ACK flag appears at the beginning and the RST flag appears at the end of the connection

D. When the FIN flag appears at the beginning and the SYN flag appears at the end of the connection

Browse 653 Q&As
Questions 15

You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?

A. A NIDS device would work best for the company.

B. A HIPS device would best suite this company.

C. The best solution to cover the needs of this company would be a HIDS device.

D. You are suggesting a NIPS device.

Browse 653 Q&As
Questions 16

Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented. What is the correct hierarchy for a security policy implementation?

A. Procedures, Policies, Laws, Standards and Regulations

B. Laws, Regulations, Policies, Standards and Procedures

C. Regulations, Policies, Laws, Standards and Procedures

D. Laws, Policies, Regulations, Procedures and Standards

Browse 653 Q&As
Questions 17

The _______ protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

A. RARP

B. ICMP

C. ARP

D. DHCP

Browse 653 Q&As
Questions 18

What command is used to terminate certain processes in an Ubuntu system?

A. # netstat Kill [ Target Process]

B. #ps ax Kill

C. #grep Kill [Target Process]

D. #kill -9 [PID]

Browse 653 Q&As
Exam Code: 312-38
Exam Name: Certified Network Defender (CND)
Last Update: Mar 27, 2024
Questions: 653 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99