312-38 無料問題集「EC-COUNCIL EC-Council Certified Network Defender CND」

Identify the correct statements regarding a DMZ zone:

解説: (JPNTest メンバーにのみ表示されます)
According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?

解説: (JPNTest メンバーにのみ表示されます)
Which category of suspicious traffic signatures includes SYN flood attempts?

解説: (JPNTest メンバーにのみ表示されます)
Identify the type of event that is recorded when an application driver loads successfully in Windows.

解説: (JPNTest メンバーにのみ表示されます)
Which of the following refers to the clues, artifacts, or evidence that indicate a potential intrusion or malicious activity in an organization's infrastructure?

解説: (JPNTest メンバーにのみ表示されます)
You are responsible for network functions and logical security throughout the corporation. Your company has over 250 servers running Windows Server 2012, 5000 workstations running Windows 10, and 200 mobile users working from laptops on Windows 8. Last week 10 of your company's laptops were stolen from a salesman, while at a conference in Barcelona. These laptops contained proprietary company information.
While
doing a damage assessment, a news story leaks about a blog post containing information about the stolen laptops and the sensitive information. What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?

解説: (JPNTest メンバーにのみ表示されます)
Which firewall technology provides the best of both packet filtering and application-based filtering and is used in Cisco Adaptive Security Appliances?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following refers to a potential occurrence of an undesired event that can eventually damage and interrupt the operational and functional activities of an organization?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following is an example of MAC model?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following types of information can be obtained through network sniffing? (Select all that apply)

正解:B、C、D 解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?

解説: (JPNTest メンバーにのみ表示されます)
What defines the maximum time period an organization is willing to lose data during a major IT outage event?

解説: (JPNTest メンバーにのみ表示されます)
James, a network admin in a large US based IT firm, was asked to audit and implement security controls over all network layers to achieve Defense-in-Depth. While working on this assignment, James has implemented both blacklisting and whitelisting ACLs. Which layer of defense-in-depth architecture is Jason working on currently?

解説: (JPNTest メンバーにのみ表示されます)
The CEO of Max Rager wants to send a confidential message regarding the new formula for its coveted soft drink, SuperMax, to its manufacturer in Texas. However, he fears the message could be altered in transit. How can he prevent this incident from happening and what element of the message ensures the success of this method?

解説: (JPNTest メンバーにのみ表示されます)
You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?

解説: (JPNTest メンバーにのみ表示されます)
Rick has implemented several firewalls and IDS systems across his enterprise network. What should he do to effectively correlate all incidents that pass through these security controls?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following security models enable strict identity verification for every user or device attempting to access the network resources?
1. Zero-trust network model
2. Castle-and-Moat model

解説: (JPNTest メンバーにのみ表示されます)
Which of the following characteristics represents a normal TCP packet?

解説: (JPNTest メンバーにのみ表示されます)
Which of the following entities is responsible for cloud security?

解説: (JPNTest メンバーにのみ表示されます)

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡