Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 312-38 - Certified Network Defender (CND)

Page: 10 / 11
Total 362 questions

Jason works as a System Administrator for www.company.com Inc. The company has a Windows

based network. Sam, an employee of the company, accidentally changes some of the applications and

system settings. He complains to Jason that his system is not working properly. To troubleshoot the

problem, Jason diagnoses the internals of his computer and observes that some changes have been

made in Sam's computer registry. To rectify the issue, Jason has to restore the registry. Which of the

following utilities can Jason use to accomplish the task? Each correct answer represents a complete

solution. Choose all that apply.

A.

Resplendent registrar

B.

Reg.exe

C.

Regedit.exe

D.

EventCombMT

Which scan attempt can penetrate through a router and a firewall that filter incoming packets with particular flags set and is not supported by Windows?

A.

ARP scan attempt

B.

TCP full connect scan attempt

C.

TCP null scan attempt

D.

PINC sweep attempt

If Myron, head of network defense at Cyberdyne, wants to change the default password policy settings on the company’s Linux systems, which directory should he access?

A.

/etc/logrotate.conf

B.

/etc/hosts.allow

C.

/etc/crontab

D.

/etc/login.defs

Who is responsible for conveying company details after an incident?

A.

PR specialist

B.

IR officer

C.

IR manager

D.

IR custodians

Which of the following security models enable strict identity verification for every user or device attempting to access the network resources?

1. Zero-trust network model

2. Castle-and-Moat model

A.

Both 1 and 2

B.

1 only

C.

2 only

D.

None

Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle

on?

A.

Ivan settled on the private encryption method.

B.

Ivan settled on the symmetric encryption method.

C.

Ivan settled on the asymmetric encryption method

D.

Ivan settled on the hashing encryption method

Which of the following is an example of Indicators of Attack?

A.

Malware

B.

Signatures

C.

Exploits

D.

Remote code execution

The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank's business is very high. How should this risk be categorized in the

risk matrix?

A.

High

B.

Medium

C.

Extreme

D.

Low

Jason has set a firewall policy that allows only a specific list of network services and denies everything else. This strategy is known as a ____________.

A.

Default allow

B.

Default access

C.

Default accept

D.

Default deny

Under which of the following acts can an international financial institution be prosecuted if it fails to maintain the privacy of its customer’s information?

A.

GLBA

B.

FISMA

C.

DMCA

D.

SOX