최신 312-38 무료덤프 - EC-COUNCIL EC-Council Certified Network Defender CND
You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from certain region. You suspect a DoS incident on the network.
What will be your first reaction as a first responder?
What will be your first reaction as a first responder?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the servers and the user network.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following information security standards defines security policies, technologies and ongoing processes for organizations that handle cardholder information for debit, credit, prepaid, epurse, ATM, and POS cards?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following filters car be applied to detect an ICMP ping sweep attempt using Wireshark?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Daniel who works as a network administrator has just deployed an in his organizations network. He wants to calculate the False Positive rate for his implementation. Which of the following formulas will he use to calculate the False Positive rate?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which type of information security policy addresses the implementation and configuration of technology and user behavior?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Identify the firewall technology that monitors the TCP handshake between the packets to determine whether a requested session is legitimate.
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Docker provides Platforms-a-Service (PaaS) through __________ and deliver*; containerized software packages
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
A popular e-commerce company has recently received a lot of complaints from its customers. Most of the complaints are about the customers being redirected to some other website when trying to access the e-com site, leading to all their systems being compromised and corrupted. Upon investigation, the network admin of the firm discovered that some adversary had manipulated the company's IP address in the domain name server's cache. What is such an attack called?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. Which step should Malone list as the last step in the incident response methodology?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Patrick wants to change the file permission of a file with permission value 755 to 744. He used a Linux command chmod [permission Value] [File Name] to make these changes. What will be the change in the file access?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident.
Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)
Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)
정답: A,B,C,D
설명: (DumpTOP 회원만 볼 수 있음)
What is the best way to describe a mesh network topology?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is a windows in-built feature that provides filesystem-level encryption in the OS (starting from Windows 2000). except the Home version of Windows?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)