312-38試験無料問題集「EC-COUNCIL EC-Council Certified Network Defender CND 認定」

Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What should the new employees answer?

解説: (GoShiken メンバーにのみ表示されます)
Who is an IR custodian?

解説: (GoShiken メンバーにのみ表示されます)
Which scan attempt can penetrate through a router and a firewall that filter incoming packets with particular flags set and is not supported by Windows?

解説: (GoShiken メンバーにのみ表示されます)
Which authentication technique involves mathematical pattern-recognition of the colored part of the eye behind the cornea?

解説: (GoShiken メンバーにのみ表示されます)
Ryan is a network security administrator, who wants to implement local security policies for privileges granted to users and groups, system security audit settings, user authentication, and want to send security audit messages to the Event Log. Which Windows security component fulfills Ryan's requirement?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following NIST incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?

解説: (GoShiken メンバーにのみ表示されます)
Identify the minimum number of drives required to setup RAID level 5.

解説: (GoShiken メンバーにのみ表示されます)
Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs responds with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?

解説: (GoShiken メンバーにのみ表示されます)
Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21. What does this source address signify?

解説: (GoShiken メンバーにのみ表示されます)
Which type of risk treatment process Includes not allowing the use of laptops in an organization to ensure its security?

解説: (GoShiken メンバーにのみ表示されます)
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is true regarding any attack surface?

解説: (GoShiken メンバーにのみ表示されます)