Practice Free 312-38 Exam Online Questions
A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0.
What IP address class is the network range a part of?
- A . Class C
- B . Class A
- C . Class B
- D . Class D
B
Explanation:
The IP address range from 0.0.0.0 to 127.255.255.255 falls under Class A. In the Class A type of network, the first octet (the first 8 bits of the IP address) is used for the network part, and the remaining 24 bits are used for host addresses. The default subnet mask for Class A is 255.0.0.0, which aligns with the given network’s default subnet mask. Class A networks are designed to support a very large number of hosts. The first bit of a Class A address is always set to 0, which means the first octet can range from 1 to 127, thus including the given IP address range.
Reference: This explanation is based on standard networking principles regarding IP address classes as outlined in resources like the Meridian Outpost article on IPv4 address classes1, and is consistent with the objectives and documents of the EC-Council’s Certified Network Defender (CND) program.
A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0.
What IP address class is the network range a part of?
- A . Class C
- B . Class A
- C . Class B
- D . Class D
B
Explanation:
The IP address range from 0.0.0.0 to 127.255.255.255 falls under Class A. In the Class A type of network, the first octet (the first 8 bits of the IP address) is used for the network part, and the remaining 24 bits are used for host addresses. The default subnet mask for Class A is 255.0.0.0, which aligns with the given network’s default subnet mask. Class A networks are designed to support a very large number of hosts. The first bit of a Class A address is always set to 0, which means the first octet can range from 1 to 127, thus including the given IP address range.
Reference: This explanation is based on standard networking principles regarding IP address classes as outlined in resources like the Meridian Outpost article on IPv4 address classes1, and is consistent with the objectives and documents of the EC-Council’s Certified Network Defender (CND) program.
Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization’s need.
Which of the following factors will the administrator consider when
deciding on the appropriate backup medium?
- A . Capability
- B . Accountability
- C . Extensibility
- D . Reliability
ACD
Explanation:
When deciding on the appropriate backup medium, the network administrator will consider Reliability as the primary factor. This is because the backup medium must be dependable for restoring data in case of data loss or system failure. The reliability of a backup medium ensures that data can be recovered accurately and completely when needed.
Reference: The importance of reliability in choosing a backup medium is supported by best practices in data backup and recovery, which emphasize the need for a dependable backup solution to ensure data integrity and availability1234.
Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented.
What is the correct hierarchy for a security policy implementation?
- A . Laws, Policies, Regulations, Procedures and Standards
- B . Regulations, Policies, Laws, Standards and Procedures
- C . Laws, Regulations, Policies, Standards and Procedures
- D . Procedures, Policies, Laws, Standards and Regulations
C
Explanation:
The correct hierarchy for implementing a security policy starts with the Laws, which are the highest level of legal requirements that an organization must follow. Next are the Regulations, which are specific rules that are derived from laws and apply to certain sectors or types of data. Following regulations, we have Policies, which are high-level statements of management intent and direction for security within the organization. Standards come next; they are specific mandatory controls, rules, and configurations that implement the policies. Finally, Procedures are detailed step-by-step instructions that ensure consistent and repeatable compliance with the standards.
Reference: This hierarchy is supported by various sources, including industry best practices and guidelines on information security policy implementation. The hierarchy aligns with the principles outlined in resources such as the LinkedIn article on Information Security Policy Hierarchy1 and the Gartner community post which states "Policy sets goals, Standards define rules. Controls implement standards, procedures detail steps. Secure baseline config ensures compliance."2.
Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented.
What is the correct hierarchy for a security policy implementation?
- A . Laws, Policies, Regulations, Procedures and Standards
- B . Regulations, Policies, Laws, Standards and Procedures
- C . Laws, Regulations, Policies, Standards and Procedures
- D . Procedures, Policies, Laws, Standards and Regulations
C
Explanation:
The correct hierarchy for implementing a security policy starts with the Laws, which are the highest level of legal requirements that an organization must follow. Next are the Regulations, which are specific rules that are derived from laws and apply to certain sectors or types of data. Following regulations, we have Policies, which are high-level statements of management intent and direction for security within the organization. Standards come next; they are specific mandatory controls, rules, and configurations that implement the policies. Finally, Procedures are detailed step-by-step instructions that ensure consistent and repeatable compliance with the standards.
Reference: This hierarchy is supported by various sources, including industry best practices and guidelines on information security policy implementation. The hierarchy aligns with the principles outlined in resources such as the LinkedIn article on Information Security Policy Hierarchy1 and the Gartner community post which states "Policy sets goals, Standards define rules. Controls implement standards, procedures detail steps. Secure baseline config ensures compliance."2.
Which of the following NIST incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?
- A . Scans/Probes/Attempted Access
- B . Malicious code
- C . Improper usage
- D . Denial-of-Service
A
Explanation:
According to NIST guidelines, the incident category that includes activities seeking to access or identify a federal agency computer, open ports, protocols, services, or any combination thereof for later exploitation is categorized as ‘Scans/Probes/Attempted Access’. This category encompasses any unauthorized attempts to access systems, networks, or data, which may include scanning for vulnerabilities or probing to discover open ports and services.
Reference: The NIST Special Publication 800-61 Revision 2, titled “Computer Security Incident Handling Guide,” outlines the various categories of incidents and recommends best practices for incident response. It details how to handle incidents such as scans, probes, and attempted access, which are precursors to more serious attacks12.
Based on which of the following registry key, the Windows Event log audit configurations are recorded?
- A . HKEY_LOCAL_MACHINESYSTEMServicesEventLog < ErrDev >
- B . HKEY_LOCAL_MACHINESYSTEMCurrentControlSetEventLog < EntAppsvc >
- C . HKEY_LOCAL_MACHINECurrentControlSetServicesEventLog< ESENT >
- D . HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLog < Event Log >
D
Explanation:
The Windows Event Log audit configurations are recorded in the registry key path HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventLog. This key contains subkeys for each of the event logs on the system, including the Application, Security, and System logs, among others. Each of these subkeys can contain a number of values that determine how events are logged, which can include the maximum size of the log, the retention method, and the file path where the log is stored. Audit policies can be configured to determine which events are recorded in these logs, and the configurations are reflected in the registry under this key.
Reference: The information provided is based on standard Windows operating system behavior and aligns with the Certified Network Defender (CND) curriculum, which includes understanding and managing Windows logging and auditing settings as part of network security monitoring and defense strategies.
To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?
- A . Prudent policy
- B . Paranoid policy
- C . Promiscuous policy
- D . Permissive policy
A
Explanation:
The Prudent policy is the most appropriate choice for Brian, the network administrator, to provide optimum security while enabling necessary services and blocking known dangerous ones. This policy strikes a balance between security and usability, allowing safe and necessary services to operate while preventing potentially harmful activities. It also includes measures to make employees accountable for their online activity, which is essential for maintaining a secure network environment.
Reference: The EC-Council’s Certified Network Defender (CND) program emphasizes the importance of implementing a prudent Internet Access policy as part of a defense-in-depth security strategy. This approach is critical for protecting the network, data, and ensuring that the organization’s security policies are enforced effectively12.
Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an ______for legal advice to defend them against this allegation.
- A . PR Specialist
- B . Attorney
- C . Incident Handler
- D . Evidence Manager
B
Explanation:
In the context of legal proceedings, especially when facing allegations of making personal information public, a company would seek the expertise of an attorney. An attorney is qualified to provide legal advice, represent the company in court, and help navigate the complexities of the law regarding data protection and privacy. They would also assist in formulating a defense strategy and ensure that the company’s rights are protected throughout the legal process.
Reference: The role of an attorney in defending against allegations of public disclosure of personal information is supported by legal practices and the advice provided by law firms and legal experts12345.
Which of the following is a data destruction technique that protects the sensitivity of information against a laboratory attack where an unauthorized individual uses signal processing recovery tools in a laboratory environment to recover the information?
- A . Purging
- B . Destroying
- C . Clearing
- D . Disposal
A
Explanation:
Purging is a data destruction technique designed to protect the sensitivity of information against laboratory attacks. In such attacks, unauthorized individuals may use advanced signal processing recovery tools to recover previously stored information. Purging involves removing the stored data in a way that it cannot be reconstructed by any means, including laboratory techniques. This process often includes degaussing, which demagnetizes the magnetic field of storage media, thereby making data recovery virtually impossible.
Reference: The information provided aligns with the Certified Network Defender (CND) course’s objectives regarding data destruction and protection against laboratory attacks. For more detailed information, please refer to the official CND study guide and documents.