Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 312-38 - Certified Network Defender (CND)

Page: 3 / 11
Total 362 questions

The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

A.

RARP

B.

ICMP

C.

DHCP

D.

ARP

Individuals in the organization using system resources against acceptable usage policies indicates which of the following security incident:

A.

Malicious Code

B.

Denial-of-Service ( DoS )

C.

Improper Usage

D.

Unauthorized Access

George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the______________.

A.

Archived data

B.

Deleted data

C.

Data in transit

D.

Backup data

Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?

A.

Containment

B.

Assign eradication

C.

A follow-up

D.

Recovery

------------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

A.

802.15

B.

802.16

C.

802.15.4

D.

802.12

Which of the following statement holds true in terms of containers?

A.

Container requires more memory space

B.

Each container runs in its own OS

C.

Container is fully isolated; hence, more secure

D.

Process-level isolation happens; a container in hence less secure

Which field is not included in the TCP header?

A.

Source IP address

B.

Acknowledgment number

C.

Sequence number

D.

Source Port

Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?

A.

Contain the damage

B.

Disconnect the five infected devices from the network

C.

Inform the IRT about the incident and wait for their response

D.

Inform everybody in the organization about the attack

Which of the following entities is responsible for cloud security?

A.

Cloud provider

B.

Cloud consumer

C.

Cloud broker

D.

Both cloud consumer and provider

Martin is a professional hacker. He is performing reconnaissance on an organization to hack a few

target systems. As a part of this method, he needs to determine what hosts are available on the

network, what services those hosts are offering, what operating systems they are running, what type of

packet filters/firewalls, etc. To obtain such information, Martin decided to use automated tools.

Which of the following tool must be employed by Martin?

A.

Burp Suite

B.

FOCA

C.

Nmap

D.

Zendio