Last Updated on July 19, 2021 by InfraExam
312-38 : Certified Network Defender : Part 16
-
Which of the following is a centralized collection of honeypots and analysis tools?
- Production honeypot
- Honeynet
- Research honeypot
- Honeyfarm
-
Which of the following routing metrics is the sum of the costs associated with each link traversed?
- Routing delay
- Communication cost
- Bandwidth
- Path length
-
Which of the following honeypots is a useful little burglar alarm?
- Backofficer friendly
- Specter
- Honeynet
- Honeyd
-
What is the location of honeypot on a network?
- Honeyfarm
- Honeynet
- Hub
- DMZ
-
Which of the following is an open source implementation of the syslog protocol for Unix?
- syslog-os
- syslog Unix
- syslog-ng
- Unix-syslog
-
Which of the following systems is formed by a group of honeypots?
- Research honeypot
- Honeyfarm
- Honeynet
- Production honeypot
-
Which of the following protocols is a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and provides tunneling, address assignment, and authentication?
- IP
- L2TP
- PPP
- DHCP
-
Which of the following sets of incident response practices is recommended by the CERT/CC?
- Prepare, notify, and follow up
- Notify, handle, and follow up
- Prepare, handle, and notify
- Prepare, handle, and follow up
-
Which of the following tools scans the network systems for well-known and often exploited vulnerabilities?
- Nessus
- SAINT
- SATAN
- HPing
-
Which of the following tools examines a system for a number of known weaknesses and alerts the administrator?
- Nessus
- COPS
- SATAN
- SAINT
-
Which of the following is the full form of SAINT?
- System Automated Integrated Network Tool
- Security Admin Integrated Network Tool
- System Admin Integrated Network Tool
- System Administrators Integrated Network Tool
-
Which of the following is a type of VPN that involves a single VPN gateway?
- Remote-access VPN
- Extranet-based VPN
- PPTP VPN
- Intranet-based VPN
-
Which of the following is a free security-auditing tool for Linux?
- SAINT
- SATAN
- Nessus
- HPing
-
Which of the following types of RAID is also known as disk striping?
- RAID 0
- RAID 2
- RAID 1
- RAID 3
-
Which of the following is a process of transformation where the old system can no longer be maintained?
- Disaster
- Risk
- Threat
- Crisis
-
Which of the following phases is the first step towards creating a business continuity plan?
- Business Impact Assessment
- Scope and Plan Initiation
- Business Continuity Plan Development
- Plan Approval and Implementation
-
Which of the following is one of the most commonly used implementations of RAID?
- RAID 2
- RAID 3
- RAID 1
- RAID 5
-
Which of the following types of RAID offers no protection for the parity disk?
- RAID 2
- RAID 1
- RAID 5
- RAID 3
-
Which of the following processes helps the business units to understand the impact of a disruptive event?
- Plan approval and implementation
- Business continuity plan development
- Scope and plan initiation
- Business impact assessment
-
Which of the following is a network analysis tool that sends packets with nontraditional IP stack parameters?
- Nessus
- COPS
- SAINT
- HPing