ECCouncil 312-38 - Certified Network Defender (CND)
Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any one of the main
nodes fail?
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec
tunnel function on?
Which of the following is not part of the recommended first response steps for network defenders?
Based on which of the following registry key, the Windows Event log audit configurations are recorded?
Which of the following NIST incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?
In MacOS, how can the user implement disk encryption?
Which component of the data packets is encrypted in Transport mode encryption of an IPsec server?
Which of the following Wireshark filters allows an administrator to detect SYN/FIN DDoS attempt on
the network?
Which of the following is a best practice for wireless network security?
You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site is hosted.
Which vulnerability assessment tool should you consider using?