Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 312-38 CND Certification Sample Questions Solved
- 01. In Public Key Infrastructure (PKI), which authority is responsible for issuing and verifying the certificates?
- a) Registration authority
- b) Certificate authority
- c) Digital Certificate authority
- d) Digital signature authority
- 02. Which of the following network security controls can an administrator use to detect, deflect or study attempts to gain unauthorized access to information systems?
- a) IDS/IPS
- b) Network Protocol Analyzer
- c) Proxy Server
- d) Honeypot
- 03. Which authentication technique involves mathematical pattern-recognition of the colored part of the eye behind the cornea?
- a) Iris Scanning
- b) Retinal Scanning
- c) Facial Recognition
- d) Vein Scanning
- 04. What is a person, who offers formal experienced testimony in the court, called?
- a) Expert Witness
- b) Evidence Manager
- c) Evidence Documenter
- d) Attorney
- 05. Which technique is used in RAID level 0 where the data is split into blocks and written evenly across multiple disks?
- a) Disk mirroring
- b) Disk stripping
- c) Data splitting
- d) Disk partition
- 06. Which of the following VPN topologies establishes a persistent connection between an organizations main office and its branch offices using a third-party network or the Internet?
- a) Hub-and-Spoke
- b) Full Mesh
- c) Star
- d) Point-to-Point
- 07. Identify the Password Attack Technique in which the adversary attacks cryptographic hash functions based on the probability, that if a hashing process is used for creating a key, then the same is used for other keys?
- a) Dictionary Attack
- b) Brute Forcing Attack
- c) Hybrid Attack
- d) Birthday Attack
- 08. Which of the following Wireshark filters can a network administrator use to view the packets without any flags set in order to detect TCP Null Scan attempts?
- a) TCP.flags==0x000
- b) tcp.flags==0X029
- c) tcp.flags==0x003
- d) tcp.dstport==7
- 09. Which of the following commands can be used to disable unwanted services on Debian, Ubuntu and other Debian-based Linux distributions?
- a) # chkconfig [service name]off
- b) # chkconfig [service name] –del
- c) # service [service name] stop
- d) # update-rc.d -f [service name] remove
- 10. Under which of the following acts can an international financial institution be prosecuted if it fails to maintain the privacy of its customer’s information?
- a) GLBA
- b) FISMA
- c) DMCA
- d) SOX
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- (CND)Answers:
- Question: 01
- Answer: b
- Question: 02
- Answer: d
- Question: 03
- Answer: a
- Question: 04
- Answer: a
- Question: 05
- Answer: b
- Question: 06
- Answer: a
- Question: 07
- Answer: d
- Question: 08
- Answer: a
- Question: 09
- Answer: d
- Question: 10
- Answer: a
Add Comment
Please, Sign In to add comment