Free Certification Practice Questions

ECCOUNCIL-CND

Loading…
Which of the following types of RAID is also known as disk striping?
#1
Which of the following is a process of transformation where the old system can no longer be maintained?
#2
Which of the following types of RAID offers no protection for the parity disk?
#3
Adam works as a Professional Penetration Tester. A project has been assigned to him to test the vulnerabilities of the CISCO Router of Umbrella Inc. Adam finds out that HTTP Configuration Arbitrary Administrative Access Vulnerability exists in the router. By applying different password cracking tools, Adam gains access to the router. He analyzes the router config file and notices the following lines: logging buffered errors logging history critical logging trap warnings logging 10.0.1.103 By analyzing the above lines, Adam concludes that this router is logging at log level 4 to the syslog server 10.0.1.103. He decides to change the log level from 4 to 0. Which of the following is the most likely reason of changing the log level?
#4
Which of the following is the best way of protecting important data against virus attack?
#5
Which of the following is a term to describe the use of inert gases and chemical agents to extinguish a fire?
#6
Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?
#7
Which of the following is a mandatory password-based and key-exchange authentication protocol?
#8
Which of the following encryption techniques do digital signatures use?
#9
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?
#10
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
#11
What is the range for registered ports?
#12
How many layers are present in the TCP/IP model?
#13
In which of the following transmission modes is communication uni-directional?
#14
CSMA/CD is specified in which of the following IEEE standards?
#15
What is the correct order of activities that a IDS is supposed to attempt in order of detect an intrusion?
#16
Which of the following interfaces uses hot plugging technique to replace computer components without the need to shut down the system?
#17
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
#18
Alex is administering the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?
#19
Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?
#20
Which of the following refers to the clues, artifacts, or evidence that indicate a potential intrusion or malicious activity in an organization’s infrastructure?
#21
John is the Vice-President of a BPO. He wants to implement a policy allowing employees to use and manage devices purchased by the organization but restrict the use of the device for business use only. Which among the following policies does John want to implement?
#22
Which phase of incident response process involves collection of incident evidence and sending them to forensic department for further investigation?
#23
Maximus Tech is a multinational company that uses Cisco ASA Firewalls for their systems. Jason is the one of the members of the team that checks the logs at Maximus Tech. As a part of his job, he is going through the logs and he came across a firewall log that looks like this: May 06 2018 21:27:27 asa 1: % ASA -5 – 11008: User ‘enable_15’ executed the ‘configure term’ command Based on the security level mentioned in the log, what did Jason understand about the description of this message?
#24
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
#25
A local bank wants to protect their card holder data. The bank should comply with the __________ standard to ensure the security of card holder data.
#26
Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?
#27
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works. The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of solution does Fred's boss want to implement?
#28
Which of the following can be used to suppress fire from Class K sources?
#29
Match the following NIST security life cycle components with their activities:
#30
Question image