Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-38 Exam Dumps - Certified Network Defender (CND)

Go to page:
Question # 89

Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?

A.

Hash rule

B.

Path rule

C.

Internet zone rule

D.

Certificate rule

Full Access
Question # 90

What is the correct order of activities that a IDS is supposed to attempt in order to detect an intrusion?

A.

Prevention, Intrusion Monitoring, Intrusion Detection, Response

B.

Intrusion Monitoring, Intrusion Detection, Response, Prevention

C.

Intrusion Detection, Response, Prevention, Intrusion Monitoring

D.

Prevention, Intrusion Detection, Response, Intrusion Monitoring

Full Access
Question # 91

You want to increase your network security implementing a technology that only allows certain MAC addresses in specific ports in the switches; which one of the above is the best choice?

A.

Port Security

B.

Port Detection

C.

Port Authorization

D.

Port Knocking

Full Access
Question # 92

The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of

following physical security measures should the administrator use?

A.

Bollards

B.

Fence

C.

Video surveillance

D.

Mantrap

Full Access
Question # 93

Which of the following standards does a cloud service provider has to comply with, to protect the privacy of its customer’s personal information?

A.

ISO/IEC 27018

B.

ISO/IEC 27019

C.

ISO/IEC 27020

D.

ISO/IEC 27021

Full Access
Question # 94

Which OSI layer does a Network Interface Card (NIC) work on?

A.

Physical layer

B.

Presentation layer

C.

Network layer

D.

Session layer

Full Access
Question # 95

According to standard loT security practice, loT Gateway should be connected to a -------------

A.

Border router

B.

Secure router

C.

Pouter that is connected to internal servers

D.

Router that is connected to other subnets

Full Access
Question # 96

Patrick wants to change the file permission of a file with permission value 755 to 744. He used a Linux command chmod [permission Value] [File Name] to make these changes. What will be the change

in the file access?

A.

He changed the file permission from rwxr-xr-x to rwx-r--r--

B.

He changes the file permission from rwxr-xr-x to rw-rw-rw-

C.

He changed the file permission from rw------- to rw-r--r--

D.

He changed the file permission from rwxrwxrwx to rwx------

Full Access
Go to page: