Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-38 Exam Dumps - Certified Network Defender (CND)

Go to page:
Question # 9

Which of the following creates passwords for individual administrator accounts and stores them in Windows AD?

A.

LSASS

B.

SRM

C.

SAM

D.

LAPS

Full Access
Question # 10

John is a senior network security administrator working at a multinational company. He wants to block specific syscalls from being used by container binaries. Which Linux kernel feature restricts actions

within the container?

A.

Cgroups

B.

LSMs

C.

Seccomp

D.

Userns

Full Access
Question # 11

Which of the following is not part of the recommended first response steps for network defenders?

A.

Restrict yourself from doing the investigation

B.

Extract relevant data from the suspected devices as early as possible

C.

Disable virus protection

D.

Do not change the state of the suspected device

Full Access
Question # 12

John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which

of the following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt?

A.

Tcp.flags==0x2b

B.

Tcp.flags=0x00

C.

Tcp.options.mss_val<1460

D.

Tcp.options.wscale_val==20

Full Access
Question # 13

Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?

A.

System Specific Security Policy (SSSP)

B.

Incident Response Policy (IRP)

C.

Enterprise Information Security Policy (EISP)

D.

Issue Specific Security Policy (ISSP)

Full Access
Question # 14

You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You suspect a DoS incident on the network. What will be your

first reaction as a first responder?

A.

Avoid Fear, Uncertainty and Doubt

B.

Communicate the incident

C.

Make an initial assessment

D.

Disable Virus Protection

Full Access
Question # 15

A local bank wants to protect their card holder data. The bank should comply with the________standard to ensure the security of card holder data.

A.

HIPAA

B.

ISEC

C.

PCI DSS

D.

SOAX

Full Access
Question # 16

In _______ mechanism, the system or application sends log records either on the local disk or over the network.

A.

Network-based

B.

Pull-based

C.

Push-based

D.

Host-based

Full Access
Go to page: