Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-38 Exam Dumps - Certified Network Defender (CND)

Go to page:
Question # 57

John has been working a* a network administrator at an IT company. He wants to prevent misuse of accounts by unauthorized users. He wants to ensure that no accounts have empty passwords. Which of the following commands does John use to list all the accounts with an empty password?

A.

B.

C.

D.

Full Access
Question # 58

Which policies exist only on AWS IAM identity (user, group, or role)?

A.

Inline Policies

B.

Customer-Managed Policies

C.

Power-user AWS managed policies

D.

Full access AWS managed policie

Full Access
Question # 59

Identity the method involved in purging technique of data destruction.

A.

Incineration

B.

Overwriting

C.

Degaussing

D.

Wiping

Full Access
Question # 60

Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and

warning signs.

A.

Administrative control

B.

Physical control

C.

Technical control

D.

Environmental control

Full Access
Question # 61

Which type of risk treatment process Includes not allowing the use of laptops in an organization to ensure its security?

A.

Risk avoidance

B.

Mitigate the risk

C.

Eliminate the risk

D.

Reduce the risk

Full Access
Question # 62

Which wireless networking topology setup requires same channel name and SSID?

A.

Ad-Hoc standalone network architecture

B.

Infrastructure network topology

C.

Hybrid topology

D.

Mesh topology

Full Access
Question # 63

Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to

ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?

A.

Usability

B.

Data Integrity

C.

Availability

D.

Confidentiality

Full Access
Question # 64

Identify the minimum number of drives required to setup RAID level 5.

A.

Multiple

B.

3

C.

4

D.

2

Full Access
Go to page: