Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ECCouncil 312-38 Questions Answers

Page: 3 / 27
Total 362 questions

Certified Network Defender (CND) Questions and Answers

Question 9

John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of

implementing?

Options:

A.

Application level gateway

B.

Circuit level gateway

C.

Stateful Multilayer Inspection

D.

Packet Filtering

Question 10

The mechanism works on the basis of a client-server model.

Options:

A.

Network-based

B.

Pull-based

C.

Push-based

D.

Host-based

Question 11

Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?

Options:

A.

Contain the damage

B.

Disconnect the five infected devices from the network

C.

Inform the IRT about the incident and wait for their response

D.

Inform everybody in the organization about the attack

Question 12

Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. Which step should Malone list as the last step in the incident response methodology?

Options:

A.

Malone should list a follow-up as the last step in the methodology

B.

Recovery would be the correct choice for the last step in the incident response methodology

C.

He should assign eradication to the last step.

D.

Containment should be listed on Malone's plan for incident response.

Page: 3 / 27
Total 362 questions