Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 312-38 - Certified Network Defender (CND)

Page: 6 / 11
Total 362 questions

Which technique is used in RAID level 0 where the data is split into blocks and written evenly across multiple disks?

A.

Disk mirroring

B.

Disk stripping

C.

Data splitting

D.

Disk partition

Who oversees all the incident response activities in an organization and is responsible for all actions of the IR team and IR function?

A.

IR officer

B.

Attorney

C.

IR custodians

D.

PR specialist

Ryan is a network security administrator, who wants to implement local security policies for privileges granted to users and groups, system security audit settings, user authentication, and want to

send security audit messages to the Event Log. Which Windows security component fulfills Ryan’s requirement?

A.

Security Reference Monitor (SRM)

B.

The Security Account Manager (SAM)

C.

The Local Security Authority Subsystem (LSASS)

D.

WinLogon and NetLogon

Henry, head of network security at Gentech, has discovered a general report template that someone has reserved only for the CEO. Since the file has to be editable, viewable, and deletable by everyone, what permission value should he set?

A.

777

B.

700

C.

755

D.

0600

Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?

A.

Normal backup

B.

Warm backup

C.

Hot backup

D.

Cold backup

Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted

publisher. Which of the following script execution policy setting this?

A.

AllSigned

B.

Restricted

C.

RemoteSigned

D.

Unrestricted

Which firewall technology can be implemented in all (application, session, transport, network, and presentation) layers of the OSl model?

A.

Circuit-level gateway

B.

Network address translation

C.

VPN

D.

Packet filtering

Which firewall technology provides the best of both packet filtering and application-based filtering and is used in Cisco Adaptive Security Appliances?

A.

VPN

B.

Stateful multilayer inspection

C.

Application level gateway

D.

Network address translation

Ryan, a network security engineer, after a recent attack, is trying to get information about the kind

of attack his users were facing. He has decided to put into production one honeypot called Kojoney. He

is interested in emulating the network vulnerability, rather than the real vulnerability system, making

this probe safer and more flexible. Which type of honeypot is he trying to implement?

A.

Research honeypot

B.

High interaction honeypots

C.

Low interaction honeypots

D.

Pure honeypots

James, a network admin in a large US based IT firm, was asked to audit and implement security

controls over all network layers to achieve Defense-in-Depth. While working on this assignment, James

has implemented both blacklisting and whitelisting ACLs. Which layer of defense-in-depth architecture is

Jason working on currently?

A.

Application Layer

B.

Host Layer

C.

Internal Network Layer

D.

Perimeter Layer