Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

312-38 Exam Dumps - Certified Network Defender (CND)

Go to page:
Question # 65

In ______ method, event logs are arranged in the form of a circular buffer.

A.

Non-wrapping method

B.

LIFO method

C.

Wrapping method

D.

FIFO method

Full Access
Question # 66

Docker provides Platforms-a-Service (PaaS) through __________ and deliver*; containerized software packages

A.

Storage-level virtualization

B.

Network level virtualization

C.

OS level visualization

D.

Server-level visualization

Full Access
Question # 67

Which type of wireless network attack is characterized by an attacker using a high gain amplifier from a nearby location to drown out the legitimate access point signal?

A.

Jamming signal attack

B.

Ad Hoc Connection attack

C.

Rogue access point attack

D.

Unauthorized association

Full Access
Question # 68

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the--------------------------authentication technique to satisfy the

management request.

A.

Two-factor Authentication

B.

Smart Card Authentication

C.

Single-sign-on

D.

Biometric

Full Access
Question # 69

Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any other communication, she mandates authentication

before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?

A.

Integrity

B.

Non-repudiation

C.

Confidentiality

D.

Authentication

Full Access
Question # 70

Which of the following is a best practice for wireless network security?

A.

Enabling the remote router login

B.

Do not changing the default SSID

C.

Do not placing packet filter between the AP and the corporate intranet

D.

Using SSID cloaking

Full Access
Question # 71

Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.

A.

Fabric virtualization

B.

Storage device virtualization

C.

Server virtualization

D.

File system virtualization

Full Access
Question # 72

If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

A.

Water

B.

Wet chemical

C.

Dry chemical

D.

Raw chemical

Full Access
Go to page: