312-38 無料問題集「EC-COUNCIL EC-Council Certified Network Defender CND」

What cryptography technique can encrypt small amounts of data and applies it to digital signatures?

解説: (JPNTest メンバーにのみ表示されます)
John has planned to update all Linux workstations in his network. The organization is using various Linux distributions including Red hat, Fedora and Debian. Which of following commands will he use to update each respective Linux distribution?
XX

解説: (JPNTest メンバーにのみ表示されます)
According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following creates passwords for individual administrator accounts and stores them in Windows AD?

解説: (JPNTest メンバーにのみ表示されます)
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a________identified which helps measure how risky an activity is.

解説: (JPNTest メンバーにのみ表示されます)
Which of the following filters car be applied to detect an ICMP ping sweep attempt using Wireshark?

解説: (JPNTest メンバーにのみ表示されます)
_______________ is a structured and continuous process which integrates information security and risk management activities into the system development life cycle (SDLC).

解説: (JPNTest メンバーにのみ表示されます)
In MacOS, how can the user implement disk encryption?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following filters can be used to detect UDP scan attempts using Wireshark?

解説: (JPNTest メンバーにのみ表示されます)
Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What should the new employees answer?

解説: (JPNTest メンバーにのみ表示されます)
USB ports enabled on a laptop is an example of____

解説: (JPNTest メンバーにのみ表示されます)
The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident.
Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)

正解:A、B、C、D 解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted publisher. Which of the following script execution policy setting this?

解説: (JPNTest メンバーにのみ表示されます)
Which Internet access policy starts with all services blocked and the administrator enables safe and necessary services individually, which provides maximum security and logs everything, such as system and network activities?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is a database encryption feature that secures sensitive data by encrypting it in client applications without revealing the encrypted keys to the data engine in MS SQL Server?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following things need to be identified during attack surface visualization?

解説: (JPNTest メンバーにのみ表示されます)
Sean has built a site-to-site VPN architecture between the head office and the branch office of his company.
When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________implementation of a VPN.

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡