Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Network Defender (CND)

Last Update 11 hours ago Total Questions : 362

The Certified Network Defender (CND) content is now fully updated, with all current exam questions added 11 hours ago. Deciding to include 312-38 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 312-38 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 312-38 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Network Defender (CND) practice test comfortably within the allotted time.

Question # 4

Frank installed Wireshark at all ingress points in the network. Looking at the logs he notices an odd packet source. The odd source has an address of 1080:0:FF:0:8:800:200C:4171 and is using port 21. What does this source address signify?

A.

This address means that the source is using an IPv6 address and is spoofed and signifies an IPv4 address of 127.0.0.1.

B.

This source address is IPv6 and translates as 13.1.68.3

C.

This source address signifies that the originator is using 802dot1x to try and penetrate into Frank ' s network

D.

This means that the source is using IPv4

Question # 5

What cryptography technique can encrypt small amounts of data and applies it to digital signatures?

A.

Hashing

B.

Asymmetric encryption

C.

Symmetric encryption

D.

Digital certificates

Question # 6

What defines the maximum time period an organization is willing to lose data during a major IT outage event?

A.

BC

B.

RTO

C.

DR

D.

RPO

Question # 7

Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?

A.

ISO/IEC 27004

B.

ISO/IEC 27002

C.

ISO/IEC 27006

D.

ISO/IEC 27005

Question # 8

Which of the following network security protocols protects from sniffing attacks by encrypting entire communication between the clients and server including user passwords?

A.

TACACS+

B.

RADIUS

C.

CHAP

D.

PAP

Question # 9

Larry is responsible for the company ' s network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because

it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server

outside of the company ' s internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls. What

logical area is Larry putting the new email server into?

A.

He is going to place the server in a Demilitarized Zone (DMZ)

B.

He will put the email server in an IPsec zone.

C.

Larry is going to put the email server in a hot-server zone.

D.

For security reasons, Larry is going to place the email server in the company ' s Logical Buffer Zone (LBZ).

Question # 10

Smith is an IT technician that has been appointed to his company ' s network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting,

Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment

plan?

A.

Their first step is to analyze the data they have currently gathered from the company or interviews.

B.

Their first step is to make a hypothesis of what their final findings will be.

C.

Their first step is to create an initial Executive report to show the management team.

D.

Their first step is the acquisition of required documents, reviewing of security policies and compliance.

Go to page: