Eccouncil 312-38 practice test

Certified Network Defender Exam


Question 1

Syslog and SNMP are the two main _______ protocols through which log records are transferred.

  • A. Pull-based
  • B. Push-based
  • C. Host-based
  • D. Network-based
Answer:

B

Discussions
0 / 600

Question 2

If an organization has decided to consume PaaS Cloud service model, then identify the organization's
responsibility that they need to look after based on shared responsibility model.

  • A. Data, interfaces, application, etc.
  • B. Data, interfaces, application, middleware, OS, VM, virtual network, etc.
  • C. Data, interfaces, application, middleware, OS, VM, virtual network, hypervisors, processing and memory, data storage, network interfaces, facilities and data centers, etc.
  • D. Data, interfaces, etc.
Answer:

A

Discussions
0 / 600

Question 3

Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?

  • A. Shared Responsibility Model for Container Services
  • B. Shared Responsibility Model for Infrastructure Services
  • C. Shared Responsibility Model for Abstract Services
  • D. Shared Responsibility Model for Storage Services
Answer:

D

Discussions
0 / 600

Question 4

Which of the following creates passwords for individual administrator accounts and stores them in
Windows AD?

  • A. LSASS
  • B. SRM
  • C. SAM
  • D. LAPS
Answer:

C

Discussions
0 / 600

Question 5

In MacOS, how can the user implement disk encryption?

  • A. By enabling BitLocker feature
  • B. By executing dm-crypt command
  • C. By turning on Device Encryption feature
  • D. By enabling FileVault feature
Answer:

D

Discussions
0 / 600

Question 6

Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:

  • A. Cloud to service attack surface
  • B. User to service attack surface
  • C. User to cloud attack surface
  • D. Cloud to user attack surface
Answer:

D

Discussions
0 / 600

Question 7

Disaster Recovery is a _________.

  • A. Operation-centric strategy
  • B. Security-centric strategy
  • C. Data-centric strategy
  • D. Business-centric strategy
Answer:

C

Discussions
0 / 600

Question 8

The CEO of Max Rager wants to send a confidential message regarding the new formula for its
coveted soft drink, SuperMax, to its manufacturer in Texas. However, he fears the message could be
altered
in
transit. How can he prevent this incident from happening and what element of the message ensures
the success of this method?

  • A. Hashing; hash code
  • B. Symmetric encryption; secret key
  • C. Hashing; public key
  • D. Asymmetric encryption; public key
Answer:

A

Discussions
0 / 600

Question 9

Which BC/DR activity includes action taken toward resuming all services that are dependent on
business-critical applications?

  • A. Response
  • B. Recovery
  • C. Resumption
  • D. Restoration
Answer:

B

Discussions
0 / 600

Question 10

Which subdirectory in /var/log directory stores information related to Apache web server?

  • A. /var/log/maillog/
  • B. /var/log/httpd/
  • C. /var/log/apachelog/
  • D. /var/log/lighttpd/
Answer:

B

Discussions
0 / 600
To page 2