Eccouncil 312-38 Certified Network Defender CND Exam Practice Test

Page: 1 / 14
Total 346 questions
Question 1

Which antenna's characteristic refer to the calculation of radiated in a particular direction. It is generally the ratio of radiation intensity in a given direction to the average radiation intensity?



Answer : C

Directivity of an antenna refers to the measure of how concentrated the radiation emitted is in a single direction. It is defined as the ratio of the radiation intensity in a given direction from the antenna to the radiation intensity averaged over all directions. In simpler terms, it is the calculation of radiated power in a particular direction compared to the average radiated power in all directions. This characteristic is crucial for antennas designed to transmit or receive signals in a specific direction, making it an essential parameter for many communication systems.


Question 2

How is the chip-level security of an IoT device achieved?



Answer : C

Chip-level security for an IoT device is achieved by implementing measures that protect the device's hardware, particularly against physical attacks and unauthorized access to debugging ports. Encrypting the JTAG (Joint Test Action Group) interface is a critical step in securing an IoT device at the chip level. The JTAG interface is a standard for testing PCBs (Printed Circuit Boards) and widely used for debugging embedded systems. If left unsecured, it can be exploited to reverse engineer the device firmware or to inject malicious code. Encryption of the JTAG interface ensures that even if attackers gain physical access to the JTAG port, they cannot use it to compromise the device without the encryption key.


Question 3

Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?



Answer : A

The Encapsulating Security Payload (ESP) component of IPsec is designed to provide confidentiality for the content of packets. ESP encrypts the data payload of IP packets to ensure that the information being transmitted remains confidential and cannot be accessed or intercepted by unauthorized parties. This encryption is crucial for protecting sensitive data as it travels across insecure networks, such as the internet.


Question 4

Which of the following systems includes an independent NAS Head and multiple storage arrays?



Answer : A

A Gateway NAS System is characterized by having an independent NAS head that manages file services and multiple storage arrays. This configuration allows for the NAS head to be connected to external storage arrays, providing flexibility and scalability. The NAS head serves as the gateway between the clients and the storage arrays, managing file I/O requests and directing them to the appropriate storage resources.


Question 5

Which protocol would the network administrator choose for the wireless network design. If he

needs to satisfy the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data

rate and use DSSS for modulation.



Answer : C

The 802.11b protocol is the correct choice for the network administrator to satisfy the specified requirements. This protocol operates in the 2.4 GHz frequency band, uses Direct-Sequence Spread Spectrum (DSSS) for modulation, and provides a data rate of up to 11 Mbits/s, which is well above the minimum requirement of 2 Mbits/s. The 802.11b standard also uses a channel width of 22 MHz, which matches the given specification. It was designed to be backward compatible with the original 802.11 standard and is widely used due to its range and compatibility with many devices.


IEEE 802.11b-1999 standard documentation.

Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications1.

Question 6

Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and

warning signs.



Answer : B

Physical controls are security measures that are designed to deny unauthorized access to facilities, equipment, and resources, and to protect personnel and property from damage or harm. Security labels and warning signs fall under this category as they are part of the physical measures taken to alert individuals about security protocols and to deter unauthorized access. These controls are a critical aspect of an organization's overall security strategy, ensuring that sensitive information and assets are physically secured against unauthorized access or alterations.


Question 7
Page:    1 / 14   
Total 346 questions