Pass the ECCouncil CND 312-38 Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

Identify the firewall technology that monitors the TCP handshake between the packets to determine whether a requested session is legitimate.

Options:

A.

Packet Filtering Firewall


B.

Stateful Multilayer Inspection


C.

Circuit Level Gateway


D.

Network Address Translation


Expert Solution
Questions # 32:

Identity the correct order for a successful black hat operation.

Options:

A.

Reconnaissance. Scanning, Gaining Access. Maintaining Access, and Covering Tracks


B.

Scanning, Reconnaissance, Gaining Access. Maintaining Access and Covering Tracks


C.

Reconnaissance. Gaming Access, Scanning. Maintaining Access, and Covering Tracks


D.

Reconnaissance, Scanning, Gaining Access, Covering Tracks, and Maintaining Access


Expert Solution
Questions # 33:

The Circuit-level gateway firewall technology functions at which of the following OSI layer?

Options:

A.

Data-link layer


B.

Session layer


C.

Network layer


D.

Transport layer


Expert Solution
Questions # 34:

What is Azure Key Vault?

Options:

A.

It is secure storage for the keys used to encrypt data at rest in Azure services


B.

It is secure storage for the keys used to encrypt data in motion in Azure services


C.

It is secure storage for the keys used to encrypt data in use in Azure services


D.

It is secure storage for the keys used to configure IAM in Azure services


Expert Solution
Questions # 35:

You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site is hosted.

Which vulnerability assessment tool should you consider using?

Options:

A.

OpenVAS


B.

hping


C.

wireshark


D.

dnsbrute


Expert Solution
Questions # 36:

Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.

Options:

A.

Fabric virtualization


B.

Storage device virtualization


C.

Server virtualization


D.

File system virtualization


Expert Solution
Questions # 37:

What command is used to terminate certain processes in an Ubuntu system?

Options:

A.

#grep Kill [Target Process}


B.

#kill-9[PID]


C.

#ps ax Kill


D.

# netstat Kill [Target Process]


Expert Solution
Questions # 38:

Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?

Options:

A.

Mirroring


B.

Striping


C.

None of these


D.

Parity


Expert Solution
Questions # 39:

Which among the following control and manage the communication between VNF with computing, storage, and network resources along with virtualization?

Options:

A.

Orchestrator


B.

VNF Manager(s)


C.

Virtualized Infrastructure Manager(s)


D.

Element Management System (EMS)


Expert Solution
Questions # 40:

Which of the following Wireshark filters can a network administrator use to view the packets without any flags set in order to detect TCP Null Scan attempts?

Options:

A.

TCP.flags==0x000


B.

tcp.flags==0X029


C.

tcp.flags==0x003


D.

tcp.dstport==7


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions