yadav2152003s

312-38 CND Certification Sample Questions Solved

Apr 26th, 2020
113
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.69 KB | None | 0 0
  1. 312-38 CND Certification Sample Questions Solved
  2.  
  3. 01. In Public Key Infrastructure (PKI), which authority is responsible for issuing and verifying the certificates?
  4. a) Registration authority
  5. b) Certificate authority
  6. c) Digital Certificate authority
  7. d) Digital signature authority
  8.  
  9. 02. Which of the following network security controls can an administrator use to detect, deflect or study attempts to gain unauthorized access to information systems?
  10. a) IDS/IPS
  11. b) Network Protocol Analyzer
  12. c) Proxy Server
  13. d) Honeypot
  14.  
  15. 03. Which authentication technique involves mathematical pattern-recognition of the colored part of the eye behind the cornea?
  16. a) Iris Scanning
  17. b) Retinal Scanning
  18. c) Facial Recognition
  19. d) Vein Scanning
  20.  
  21. 04. What is a person, who offers formal experienced testimony in the court, called?
  22. a) Expert Witness
  23. b) Evidence Manager
  24. c) Evidence Documenter
  25. d) Attorney
  26.  
  27. 05. Which technique is used in RAID level 0 where the data is split into blocks and written evenly across multiple disks?
  28. a) Disk mirroring
  29. b) Disk stripping
  30. c) Data splitting
  31. d) Disk partition
  32.  
  33. 06. Which of the following VPN topologies establishes a persistent connection between an organizations main office and its branch offices using a third-party network or the Internet?
  34. a) Hub-and-Spoke
  35. b) Full Mesh
  36. c) Star
  37. d) Point-to-Point
  38.  
  39. 07. Identify the Password Attack Technique in which the adversary attacks cryptographic hash functions based on the probability, that if a hashing process is used for creating a key, then the same is used for other keys?
  40. a) Dictionary Attack
  41. b) Brute Forcing Attack
  42. c) Hybrid Attack
  43. d) Birthday Attack
  44.  
  45. 08. Which of the following Wireshark filters can a network administrator use to view the packets without any flags set in order to detect TCP Null Scan attempts?
  46. a) TCP.flags==0x000
  47. b) tcp.flags==0X029
  48. c) tcp.flags==0x003
  49. d) tcp.dstport==7
  50.  
  51. 09. Which of the following commands can be used to disable unwanted services on Debian, Ubuntu and other Debian-based Linux distributions?
  52. a) # chkconfig [service name]off
  53. b) # chkconfig [service name] –del
  54. c) # service [service name] stop
  55. d) # update-rc.d -f [service name] remove
  56.  
  57. 10. Under which of the following acts can an international financial institution be prosecuted if it fails to maintain the privacy of its customer’s information?
  58. a) GLBA
  59. b) FISMA
  60. c) DMCA
  61. d) SOX
  62.  
  63. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
  64.  
  65. (CND)Answers:
  66. Question: 01
  67. Answer: b
  68. Question: 02
  69. Answer: d
  70. Question: 03
  71. Answer: a
  72. Question: 04
  73. Answer: a
  74. Question: 05
  75. Answer: b
  76. Question: 06
  77. Answer: a
  78. Question: 07
  79. Answer: d
  80. Question: 08
  81. Answer: a
  82. Question: 09
  83. Answer: d
  84. Question: 10
  85. Answer: a
Add Comment
Please, Sign In to add comment