Free Certification Practice Questions

ECCOUNCIL-CND

Loading…
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?
#31
Which of the following attack signature analysis techniques are implemented to examine the header information and conclude that a packet has been altered?
#32
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?
#33
Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is a problem connecting to the main server. How will you prioritize these two incidents?
#34
Which of the following IEEE standards defines a physical bus topology?
#35
Which of the following protocols is used for inter-domain multicast routing?
#36
How many layers are present in the OSI layer model?
#37
Which of the following layers of the OSI model provides physical addressing?
#38
Token Ring is standardized by which of the following IEEE standards?
#39
An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS. They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?
#40
Question image
Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?
#41
Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?
#42
During the recovery process, RTO and RPO should be the main parameters of your disaster recovery plan. What does RPO refer to?
#43
Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?
#44
Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?
#45
The SOC manager is reviewing logs in AlienVault USM to investigate an intrusion on the network. Which CND approach is being used?
#46
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?
#47
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?
#48
Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium? (Choose all that apply.)
#49
Which of the following plans are documented and organized emergency backup operations and recovery operations maintained as part of the security program to ensure the availability of critical resources and facilitate the continuity of operations in case of emergency?
#50
Which of the following is a distance vector routing protocols? Each correct answer represents a complete solution. Choose all that apply.
#51
Which of the following IP addresses is not reserved for the hosts? Each correct answer represents a complete solution. Choose all that apply.
#52
You just set up a wireless network to customers in the cafe. Which of the following are good security measures implemented? Each correct answer represents a complete solution. Choose all that apply.
#53
Which of the following is a mechanism that helps to ensure that only the intended and authorized recipients are able to read the data?
#54
Which type of information security policy addresses the implementation and configuration of technology and user behavior?
#55
What defines the maximum time period an organization is willing to lose data during a major IT outage event?
#56
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
#57
John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.
#58
Question image
Which of the following fields in the IPv6 header is decremented by 1 for each router that forwards the packet?
#59
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. (Choose two.)
#60