312-38 : Certified Network Defender : Part 19
-
What is the technique used in the cost estimates for the project during the design phase of the following? Each correct answer represents a complete solution. Choose all that apply.
- expert assessment
- The Delphi technique
- Function point analysis
- Program Evaluation Technique (PERT)
-
Which of the following is a management process that provides a framework to stimulate a rapid recovery, and the ability to react effectively to protect the interests of its brand, reputation and stakeholders?
- None
- log analysis
- Business Continuity Management
- patch management
- response systems
-
You just set up a wireless network to customers in the cafe. Which of the following are good security measures implemented? Each correct answer represents a complete solution. Choose all that apply.
- WEP encryption
- WPA encryption
- Not broadcasting the SSID
- The MAC-filtering router
-
What is needed for idle scan a closed port the next steps? Each correct answer represents a part of the solution. Choose all that apply.
- Zombie ignores unsolicited RST, and IP ID remains unchanged.
- The attacker sends a SYN/ACK zombie.
- In response to the SYN, the target to send RST.
- Zombie IP ID will increase by only 1.
- Zombie IP ID 2 rises.
-
Which of the following is a mechanism that helps to ensure that only the intended and authorized recipients are able to read the data?
- access to information
- none
- integrity
- authentication
- confidence
-
Which of the following attacks, the attacker cannot use the software, which is trying a number of key combinations in order to obtain your password?
- Buffer overflow
- Zero-day attack
- Smurf attack
- None
- Shock brutal force
-
Which of the following policies to help define what users can and should do to use the network and organization of computer equipment?
- None
- IT policy
- user policy
- general policy
- remote access policy
-
Which of the following is a class of attacks to break through, which depends on a greater probability of collisions between random attack was detected, and try to fixed rate permutations?
- Dictionary attack
- None
- birthday attack
- phishing attack
- replay attack
-
Which of the following offer “always-on” Internet service for connecting to your ISP? Each correct answer represents a complete solution. Choose all that apply.
- analog modem
- digital modem
- DSL
- cable modem
-
The attacks are classified as which of the following? Each correct answer represents a complete solution. Choose all that apply.
- replay attack
- active attack
- session hijacking
- passive attack
-
Which of the following routing metrics refers to the time required to transfer the package to the source via the Internet?
- None
- routing delay
- length of the trail
- charge
- bandwidth
-
Which of the following is a kind of security, which deals with the protection of false signals transmitted by the electrical system?
- None
- emanation Safety
- hardware security
- physical security
- communications Security
-
John works Incident Director of Tech World Inc. His job is to set up a wireless network in his organization. For this purpose, he needs to decide on appropriate equipment and policies need to set up a network. Which of the following stages of the incident handling process to help him accomplish the task?
- Preparation
- None
- Recovery
- the eradication of
- containment
-
You are using more than the safety of the existing network. You’ll find a machine that is not in use as such, but is a software that emulates the operation of a sensitive database server. What is this?
- The reactive IDS
- Honey Pot
- None
- Virus
- The polymorphic virus
-
Which of the following router configuration modes to change the terminal settings temporarily, perform basic tests, and lists the system information?
- None
- UI Config
- user EXEC
- Global Config
- the privileged EXEC
-
Which of the following is a worldwide organization whose mission is to create, refine and promote internet safety standards?
- None
- SPROUT
- ANSI
- IEEE
- WASC
-
Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.
- It uses a longer subnet masks as those used for IPv4.
- The interoperability, the IPv4 addresses using the last 32 bits of the IPv6 address.
- It provides enhanced authentication and security.
- It uses 128-bit addresses.
- It’s more of available IP addresses.
-
Which of the following types of coaxial cable used for cable television and cable modems?
- RG-8
- RG-59
- RG-58
- None
- RG-62
-
Which of the following are valid steps to secure routers? Each correct answer represents a complete solution. Choose all that apply.
- Keep routers updated with the latest security updates.
- Use a password that is easy to remember the router’s administrative console.
- Configure access list entries to prevent unauthorized connections and routing.
- Use a complex password of the router management console.
-
Each of the following is a network layer protocol used for a particular (MAC) address to obtain an IP address?
- ARP
- None
- RARP
- P.M
- PIM
Subscribe
0 Comments
Newest