312-38試験無料問題集「EC-COUNCIL EC-Council Certified Network Defender CND 認定」

Which among the following control and manage the communication between VNF with computing, storage, and network resources along with virtualization?

解説: (GoShiken メンバーにのみ表示されます)
James wants to implement certain control measures to prevent denial-of-service attacks against the organization. Which of the following control measures can help James?

解説: (GoShiken メンバーにのみ表示されます)
Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.

解説: (GoShiken メンバーにのみ表示されます)
An IT company has just been hit with a severe external security breach. To enhance the company's security posture, the network admin has decided to first block all the services and then individually enable only the necessary services. What is such an Internet access policy called?

解説: (GoShiken メンバーにのみ表示されます)
Who acts as an intermediary to provide connectivity and transport services between cloud consumers and providers?

解説: (GoShiken メンバーにのみ表示されます)
Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement and be network-wide. What type of solution would be best for Lyle?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following statement holds true in terms of containers?

解説: (GoShiken メンバーにのみ表示されます)
Which category of suspicious traffic signatures includes SYN flood attempts?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following indicators refers to potential risk exposures that attackers can use to breach the security of an organization?

解説: (GoShiken メンバーにのみ表示されます)
Which type of risk treatment process Includes not allowing the use of laptops in an organization to ensure its security?

解説: (GoShiken メンバーにのみ表示されます)
Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?

解説: (GoShiken メンバーにのみ表示されます)
John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?

解説: (GoShiken メンバーにのみ表示されます)
Sean has built a site-to-site VPN architecture between the head office and the branch office of his company.
When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________implementation of a VPN.

解説: (GoShiken メンバーにのみ表示されます)
Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium?

解説: (GoShiken メンバーにのみ表示されます)
Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. Which network topology will help the administrator solve the problem of needing to add new employees and expand?

解説: (GoShiken メンバーにのみ表示されます)
Which BC/DR activity includes action taken toward resuming all services that are dependent on business-critical applications?

解説: (GoShiken メンバーにのみ表示されます)
Disaster Recovery is a _________.

解説: (GoShiken メンバーにのみ表示されます)
Which firewall can a network administrator use for better bandwidth management, deep packet inspection, and Hateful inspection?

解説: (GoShiken メンバーにのみ表示されます)
Which among the following is used to limit the number of cmdlets or administrative privileges of administrator, user, or service accounts?

解説: (GoShiken メンバーにのみ表示されます)