Eccouncil Certified Network Defender 312-38 CND Exam Practice Test

Page: 1 / 14
Total 363 questions
Question 1

John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of

implementing?



Answer : B

A circuit level gateway operates at the session layer of the OSI model, which is responsible for establishing, maintaining, and terminating connections between network nodes. It is designed to provide security by verifying the Transmission Control Protocol (TCP) handshaking between packets to ensure that the session is legitimate and by monitoring the state of the connection. Unlike application-level gateways, circuit level gateways do not inspect the packet's contents but rather the header information to ensure that the traffic conforms to the established rules. This type of firewall is particularly effective at hiding the private network information because it only allows traffic from established sessions and does not expose the details of the network's internal structure.


Question 2

Which of the following attack signature analysis techniques are implemented to examine the header information and conclude that a packet has been altered?



Answer : D

Composite signature-based analysis is a technique used in intrusion detection systems to examine multiple attributes or behaviors over time to identify potential threats. This method can analyze packet headers to detect anomalies that may indicate a packet has been altered. It looks at a series of packets or fragments to determine if they are part of a legitimate session or if they have been manipulated as part of an attack, such as overlapping fragments which cannot be reassembled properly. This approach is more comprehensive than atomic signature-based analysis, which examines single events or packets in isolation, and provides a more contextual understanding compared to context-based or content-based analyses.


Question 3

Arman transferred some money to his friend's account using a net banking service. After a few hours, his friend informed him that he hadn't received the money yet. Arman logged on to the bank's website to investigate and discovered that the amount had been transferred to an unknown account instead. The bank, upon receiving Arman's complaint, discovered that someone had established a station between Arman's and the bank server's communication system. The station intercepted the communication and inserted another account number replacing his friend's account number. What is

such an attack called?



Answer : C

The scenario described is a classic example of a Man-in-the-Middle (MitM) attack. In this type of cyberattack, the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. The attacker has inserted themselves between the two parties, in this case, Arman and the bank's server, and has intercepted the communication to redirect the funds to a different account. This type of attack can occur in various forms, such as eavesdropping on or altering the communication over an insecure network service, but it is characterized by the attacker's ability to intercept and modify the data being exchanged without either legitimate party noticing.


Question 4

Identity the correct order for a successful black hat operation.



Answer : B

The correct sequence for a black hat operation follows a structured approach that begins withReconnaissance, where the attacker gathers preliminary data or intelligence on the target. Next isScanning, where the attacker uses technical tools to understand the network and system vulnerabilities.Gaining Accessis the phase where the vulnerabilities are exploited to enter the system or network.Maintaining Accessinvolves establishing a persistent presence within the system, often for data exfiltration or additional exploitation. Finally,Covering Tracksis the phase where the attacker erases evidence of the intrusion to avoid detection.


Question 5

Which among the following tools can help in identifying IoEs to evaluate human attack surface?



Answer : D

The tool that can help in identifying Indicators of Exposure (IoEs) to evaluate the human attack surface is theSocial-Engineer Toolkit (SET). SET is designed for social engineering penetration tests and is effective in simulating phishing attacks, which are a common method to evaluate the human aspect of security. It helps in identifying the potential human vulnerabilities that could be exploited in an organization.


Question 6

The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank's business is very high. How should this risk be categorized in the

risk matrix?



Answer : C

In the context of risk assessment, an incident that has a very high probability of occurring and the potential to impact almost 80% of a business is considered an extreme risk. This categorization is based on the severity of the impact and the likelihood of the event. The risk matrix, a tool used in risk assessment, helps in the classification of risks by considering both the impact and the probability of potential incidents. An event that affects such a significant portion of the business would typically necessitate immediate attention and the implementation of mitigation strategies to prevent substantial loss or damage.


Question 7

Which of the following things need to be identified during attack surface visualization?



Answer : D

During attack surface visualization, it is crucial to identify the assets, topologies, and policies of the organization. This involves mapping out all the devices, paths, networks, and understanding the security posture of each asset. By identifying these elements, organizations can determine where vulnerabilities may exist and how an attacker could potentially exploit them. This process helps in prioritizing security efforts and mitigating risks effectively.


Page:    1 / 14   
Total 363 questions