Free Certification Practice Questions

ECCOUNCIL-CND

Loading…
Which of the following is a session layer protocol?
#121
Which of the following IEEE standards provides specifications for wireless ATM systems?
#122
Which of the following UTP cables supports transmission up to 20MHz?
#123
Which of the following is also known as slag code?
#124
Which of the following commands is used for port scanning?
#125
How is an “attack” represented?
#126
Kelly is taking backups of the organization's data. Currently, she is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?
#127
Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.
#128
Sam wants to implement a network-based IDS and finalizes an IDS solution that works based on pattern matching. Which type of network-based IDS is Sam implementing?
#129
Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any other communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?
#130
Which of the following is not part of the recommended first response steps for network defenders?
#131
Which among the following tools can help in identifying IoEs to evaluate human attack surface?
#132
In ______ method, event logs are arranged in the form of a circular buffer.
#133
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
#134
Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?
#135
You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site hosted. Which vulnerability assessment tool should you consider to use?
#136
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?
#137
A network designer needs to submit a proposal for a company, which has just published a web portal for its clients on the internet. Such a server needs to be isolated from the internal network, placing itself in a DMZ. Faced with this need, the designer will present a proposal for a firewall with three interfaces, one for the internet network, another for the DMZ server farm and another for the internal network. What kind of topology will the designer propose?
#138
Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other. How will they ensure the authenticity of their emails?
#139
Which characteristic of an antenna refers to how directional an antennas radiation pattern is?
#140
Disaster Recovery is a
#141
The CEO of Max Rager wants to send a confidential message regarding the new formula for its coveted soft drink, SuperMax, to its manufacturer in Texas. However, he fears the message could be altered in transit. How can he prevent this incident from happening and what element of the message ensures the success of this method?
#142
Identify the method involved in purging technique of data destruction.
#143
Which type of modulation technique is used in local area wireless networks (LAWNs)?
#144
Identify the correct order for a successful black hat operation.
#145
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?
#146
Which of the following incident handling stage removes the root cause of the incident?
#147
Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?
#148
Which NIST Incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?
#149
James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. Which of the following Wireshark filters will he use?
#150