Free Certification Practice Questions

ECCOUNCIL-CND

Loading…
Which of the following tools is an open source network intrusion prevention and detection system that works network sniffer and record the operation of the network, which is coordinated pre-signatures?
#151
Which of the following firewalls are used to monitor the status of active connections, and configure the network packets to pass through the firewall? Each correct answer represents a complete solution. Choose all that apply.
#152
Which of the following conditions cannot enter the system ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
#153
You are Network Administrator Investment Bank. You're worried about people breeching network and can steal information before you can detect and shut down access. Which of the following is the best way to deal with this issue?
#154
Which of the following steps OPSEC process examines every aspect of the proposed operation to identify the OPSEC indicators that can reveal important information and then compare them with indicators of the opponent's intelligence collection capabilities identified in the previous activity?
#155
Which of the following refers to a potential occurrence of an undesired event that can eventually damage and interrupt the operational and functional activities of an organization?
#156
Which of the following statement holds true in terms of containers?
#157
Byron, a new network administrator at FBI, would like to ensure that Windows PCs there are up-to-date and have less internal security flaws. What can he do?
#158
Which BC/DR activity includes action taken toward resuming all services that are dependent on business-critical applications?
#159
If an organization has decided to consume PaaS Cloud service model, then identify the organization's responsibility that they need to look after based on shared responsibility model.
#160
Which of the following protocols is used for E-mail?
#161
Which of the following is a Cisco product that performs VPN and firewall functions?
#162
Which of the following representatives of the incident response team takes forensic backups of systems that are the focus of an incident?
#163
Which of the following is a centralized collection of honeypots and analysis tools?
#164
Which of the following tools scans the network systems for well-known and often exploited vulnerabilities?
#165
Which of the following tools examines a system for a number of known weaknesses and alerts the administrator?
#166
Which of the following is the full form of SAINT?
#167
Which of the following is a type of VPN that involves a single VPN gateway?
#168
Which of the following is a free security-auditing tool for Linux?
#169
Which type of firewall consists of three interfaces and allows further subdivision of the systems based on specific security objectives of the organization?
#170
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
#171
Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?
#172
Which of the following is an example of MAC model?
#173
Which of the following things need to be identified during attack surface visualization?
#174
Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?
#175
Docker provides Platform-as-a-Service (PaaS) through ________ and delivers containerized software packages.
#176
Mark is monitoring the network traffic on his organization's network. He wants to detect TCP and UDP ping sweeps on his network. Which type of filter will be used to detect this?
#177
Which of the following creates passwords for individual administrator accounts and stores them in Windows AD?
#178
Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:
#179
Which filter to locate unusual ICMP request an Analyst can use in order to detect a ICMP probes from the attacker to a target OS looking for the response to perform ICMP based fingerprinting?
#180