Vcehome > EC-COUNCIL > Certified Ethical Hacker > 312-38 > 312-38 Online Practice Questions and Answers

312-38 Online Practice Questions and Answers

Questions 4

Fill in the blank with the appropriate term. A is a technique to authenticate digital documents by using computer cryptography.

Browse 653 Q&As
Questions 5

Fill in the blank with the appropriate term. is a prime example of a high-interaction honeypot.

Browse 653 Q&As
Questions 6

Which of the following tools is an open source network intrusion prevention and detection system that works network sniffer and record the operation of the network, which is coordinated pre-signatures?

A. dsniff

B. kismet

C. None

D. KisMAC

E. bridle

Browse 653 Q&As
Questions 7

Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any other communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?

A. Integrity

B. Non-repudiation

C. Confidentiality

D. Authentication

Browse 653 Q&As
Questions 8

Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. Which network topology will help the administrator solve the problem of needing to add new employees and expand?

A. Mesh

B. Ring

C. Bus

D. Star

Browse 653 Q&As
Questions 9

Which of the following is the type of documented business rule for protecting information and the systems, which store and process the information

A. Information protection policy

B. Information protection document

C. Information storage policy

D. Information security policy

Browse 653 Q&As
Questions 10

Which of the following IEEE standards defines a physical bus topology?

A. 802.4

B. 802.5

C. 802.6

D. 802.3

Browse 653 Q&As
Questions 11

Which of the following help in estimating and totaling up the equivalent money value of the benefits and costs to the community of projects for establishing whether they are worthwhile? Each correct answer represents a complete solution. Choose all that apply.

A. Business Continuity Planning

B. Benefit-Cost Analysis

C. Disaster recovery

D. Cost-benefit analysis

Browse 653 Q&As
Questions 12

Which of the following is a standard-based protocol that provides the highest level of VPN security?

A. L2TP

B. IP

C. PPP

D. IPSec

Browse 653 Q&As
Questions 13

With which of the following forms of acknowledgment can the sender be informed by the data receiver about all segments that have arrived successfully?

A. Block Acknowledgment

B. Negative Acknowledgment

C. Cumulative Acknowledgment

D. Selective Acknowledgment

Browse 653 Q&As
Exam Code: 312-38
Exam Name: Certified Network Defender (CND)
Last Update: Apr 25, 2024
Questions: 653 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99