option
Questions
ayuda
daypo
search.php

Certified Network Defender TEST G

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Certified Network Defender TEST G

Description:
312-38 Exam -CND

Creation Date: 2024/01/02

Category: Others

Number of questions: 16

Rating:(11)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Which type of antenna is based on the principle of a satellite dish and can pick up Wi-Fi signals from a distance of ten miles or more?. Parabolic Grid antenna. Omnidirectional antenna. Directional antenna. Yagi antenna.

Which firewall technology can be implemented in all (application, session, transport, network, and presentation) layers of the OSI model?. Circuit-level gateway. Packet filtering. VPN. Network address translation.

Michelle is a network security administrator working at a multinational company. She wants to provide secure access to corporate data (documents, spreadsheets, email, schedules, presentations, and other enterprise data) on mobile devices across organizations networks without being slowed down and also wants to enable easy and secure sharing of information between devices within an enterprise. Based on the above-mentioned requirements, which among the following solution should Michelle implement?. MDM. MAM. MCM. MEM.

Which of the following is a Windows in-built feature that provides filesystem-level encryption in the OS (starting from Windows 2000), except the Home version of Windows?. EFS. Disk Utility. BitLocker. FileVault.

Rosa is working as a network defender at Linda Systems. Recently, the company migrated from Windows to MacOS. Rosa wants to view the security related logs of her system, where can she find these logs?. /Library/Logs/Sync. /private/var/log. /var/log/cups/access_log. ~/Library/Logs.

Which type of risk treatment process includes not allowing the use of laptops in an organization to ensure its security?. Eliminate the risk. Risk avoidance. Reduce the risk. Mitigate the risk.

Which type of information security policy addresses the implementation and configuration of technology and user behavior?. Acceptable use policy. Enterprise information security policy. Issue-specific security policy. System-specific security policy.

hat represents the ability of an organization to respond under emergency in order to minimize the damage to its brand name, business operation, and profit?. Incident management. Crisis management. Disaster recovery. Emergency management.

Who oversees all the incident response activities in an organization and is responsible for all actions of the IR team and IR function?. PR specialist. Attorney. IR officer. IR custodians.

What defines the maximum time period an organization is willing to lose data during a major IT outage event?. RPO. BC. RTO. DR.

Which of the following characteristics represents a normal TCP packet?. The destination address is a broadcast address. Source or destination port is zero. FIN ACK and ACK are used in terminating the connection. SYN and FIN bits are set.

What enables an organization to analyze, identify, and rectify hazards and prevent future recurrence in business continuity management?. Crisis management. Emergency management. Incident management. Business recovery.

Drag and drop the terms to match with their descriptions. Select and Place: Backdore. Spanware. Ping Sweep. Trojan horse.

George works as a Network Administrator for Blue Soft Inc. The company uses Windows Vista operating system. The network of the company is continuously connected to the Internet. What will George use to protect the network of the company from intrusion?. Firewall. Windows Defender. Router. Switch.

Drag and drop the Response management plans to match up with their respective purposes. It a provides measures for sustaining essential business operations while recovering from a significant disruption. It provides measures from recovering business operations immediately following a disaster. It provides measures and capabilities to maintain organizational essential, strategic functions at un alternate site for up to 30 days. It provides measures and capabilities for recovering a major application or general support system. It provides measures for disseminating status report and personnel and the public. It provides detailed measures to facilitate recovery of capabilities at an alternate site.

Drag and drop the terms to match with their descriptions. ASLR. Hypervisor. DEP.

Report abuse