Pass the ECCouncil CND 312-38 Questions and answers with CertsForce

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following refers to the clues, artifacts, or evidence that indicate a potential intrusion or malicious activity in an organization's infrastructure?

Options:

A.

Indicators of attack


B.

Indicators of compromise


C.

Key risk indicators


D.

Indicators of exposure


Expert Solution
Questions # 72:

Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?

Options:

A.

System Specific Security Policy (SSSP)


B.

Incident Response Policy (IRP)


C.

Enterprise Information Security Policy (EISP)


D.

Issue Specific Security Policy (ISSP)


Expert Solution
Questions # 73:

Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21. What does this source address signify?

Options:

A.

This address means that the source is using an IPv6 address and is spoofed and signifies an IPv4 address of 127.0.0.1.


B.

This source address is IPv6 and translates as 13.1.68.3


C.

This source address signifies that the originator is using 802dot1x to try and penetrate into Frank's network


D.

This means that the source is using IPv4


Expert Solution
Questions # 74:

A company has the right to monitor the activities of their employees on different information systems according to the _______policy.

Options:

A.

Information system


B.

User access control


C.

Internet usage


D.

Confidential data


Expert Solution
Questions # 75:

Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another

network administrator informing you that there is a problem connecting to the main server. How will you prioritize these two incidents?

Options:

A.

Based on approval from management


B.

Based on a first come first served basis


C.

Based on a potential technical effect of the incident


D.

Based on the type of response needed for the incident


Expert Solution
Questions # 76:

Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of

incident in the plan. Unsuccessful scans and probes are at what severity level?

Options:

A.

High severity level


B.

Extreme severity level


C.

Mid severity level


D.

Low severity level


Expert Solution
Questions # 77:

According to standard loT security practice, loT Gateway should be connected to a -------------

Options:

A.

Border router


B.

Secure router


C.

Pouter that is connected to internal servers


D.

Router that is connected to other subnets


Expert Solution
Questions # 78:

Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.

Options:

A.

Ring


B.

Mesh


C.

Bus


D.

Star


Expert Solution
Questions # 79:

Docker provides Platforms-a-Service (PaaS) through __________ and deliver*; containerized software packages

Options:

A.

Storage-level virtualization


B.

Network level virtualization


C.

OS level visualization


D.

Server-level visualization


Expert Solution
Questions # 80:

Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec

tunnel function on?

Options:

A.

They work on the session layer.


B.

They function on either the application or the physical layer.


C.

They function on the data link layer


D.

They work on the network layer


Expert Solution
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions