Practice Free 312-38 Exam Online Questions
Which policies exist only on AWS IAM identity (user, group, or role)?
- A . Inline Policies
- B . Customer-Managed Policies
- C . Power-user AWS managed policies
- D . Full access AWS managed policie
A
Explanation:
Inline policies are exclusive to AWS IAM identities, which include users, groups, and roles. These are policies that you create and manage and are directly embedded into a single IAM identity. Unlike managed policies, which can be attached to multiple IAM identities, inline policies are strictly one-to-one; they are an integral part of the IAM identity to which they are attached. This means that if the user, group, or role is deleted, the inline policy is also deleted. Inline policies are typically used for ensuring that specific permissions are tightly bound to an IAM identity and are not inadvertently assigned elsewhere.
Reference: The information provided is based on the AWS documentation on IAM policies, which outlines the different types of policies and their use cases, including the unique characteristics of inline policies12. For the most accurate and detailed reference, it is recommended to consult the official documents and study guides from the Certified Network Defender (CND) course by the EC-Council.
Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this,
Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on.
What should the new employees answer?
- A . NICs work on the Session layer of the OSI model.
- B . The new employees should say that NICs perform on the Network layer.
- C . They should tell Bryson that NICs perform on the Physical layer
- D . They should answer with the Presentation layer.
C
Explanation:
Network Interface Cards (NICs) operate at the Physical layer of the OSI model. This layer is responsible for the actual physical connection between devices. It transmits individual bits from one node to the next and is involved in the electrical, mechanical, procedural, and functional aspects of activating, maintaining, and deactivating physical connections. It’s also where hardware like cables, switches, and NICs come into play.
Reference: The information provided aligns with the OSI model’s definition and the role of the Physical layer as described in networking literature and resources such as GeeksforGeeks and freeCodeCamp articles on the OSI model12.
Identify the password cracking attempt involving precomputed hash values stored as plaintext and using these to crack the password.
- A . Bruteforce
- B . Rainbow table
- C . Dictionary
- D . Hybrid
B
Explanation:
The password cracking attempt described involves the use of Rainbow tables. A Rainbow table is a precomputed table for reversing cryptographic hash functions, primarily for cracking password hashes. These tables store a mapping between the hash of a password and the correct password for that hash, allowing for quick retrieval of the plaintext password if the hash is known. This method is efficient for cracking passwords because it avoids the time-consuming process of computing hashes on the fly during an attack.
Reference: Rainbow tables are a well-known tool in password cracking that leverage precomputed hash values to expedite the cracking process1. They are particularly useful when dealing with standard hashing algorithms where salting is not used, as they can significantly reduce the time needed to crack a password by avoiding the need for real-time hash calculations23. This technique is distinct from brute force attacks, which try all possible combinations, dictionary attacks, which use a list of likely passwords, and hybrid attacks, which combine elements of brute force and dictionary methods4.
Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KRI) to assess the organization.
Why is Chris calculating the KRI for his organization? It helps Chris to:
- A . Identifies adverse events
- B . Facilitates backward
- C . Facilitates post Incident management
- D . Notifies when risk has reached threshold levels
D
Explanation:
Key Risk Indicators (KRIs) are crucial metrics used in risk management to measure the likelihood of potential risks and their impact on an organization. They are designed to provide an early warning signal to notify management when a risk has reached a level that may exceed the organization’s risk appetite and could have a profoundly negative impact on its ability to succeed. KRIs are not typically used to identify adverse events, which is more the role of Key Performance Indicators (KPIs), nor are they used to facilitate backward or post-incident management directly. Instead, KRIs are forward-looking indicators that help in predicting and preventing risks before they materialize into significant threats.
Reference: The explanation provided is based on industry-standard practices for Key Risk Indicators as outlined in resources such as TechTarget and Safety Culture, which align with the objectives and documents of the Certified Network Defender (CND) program12.
David, a network and system admin, encrypted all the files in a Windows system that supports NTFS file system using Encrypted File Systems (EFS). He then backed up the same files into another Windows system that supports FAT file system. Later, he found that the backup files were not encrypted.
What could be the reason for this?
- A . EFS could only encrypt the files that follow NTFS
- B . FAT files cannot be encrypted
- C . EFS is not the encryption system used in Windows
- D . Copied files loses their encryption
A
Explanation:
The Encrypting File System (EFS) is a feature of the NTFS file system that provides encryption at the file system level. It is designed to work specifically with NTFS and does not support the FAT file system. When files encrypted with EFS are copied or backed up to a volume that uses the FAT file system, the encryption is lost because FAT does not support EFS encryption. This is why David found that the backup files were not encrypted after transferring them to a system that supports the FAT file system.
Reference: The explanation is based on the operational characteristics of EFS and its compatibility with different file systems as described in the Certified Network Defender (CND) course materials and further supported by information from reliable sources on EFS and file system encryption1234.
Michael decides to view the—————–to track employee actions on the organization’s network.
- A . Firewall policy
- B . Firewall log
- C . Firewall settings
- D . Firewall rule set
B
Explanation:
Michael would view the firewall log to track employee actions on the organization’s network. Firewall logs are records of events that are captured by the firewall. They typically include details about allowed and denied traffic, network connections, and other transactions through the firewall. By analyzing these logs, network administrators can monitor network usage, detect unusual patterns of activity, and identify potential security threats or breaches.
Reference: The importance of monitoring firewall logs is emphasized in the EC-Council’s Certified Network Defender (C|ND) program. It is part of the network traffic monitoring and analysis, which is crucial for detecting and responding to incidents on the network123.
Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm’s partners have asked that a secure wireless network be implemented in the office so employees can move about freely without being tied to a network cable. While Frank and his colleagues are familiar with wired Ethernet technologies, 802.3, they are not familiar with how to setup wireless in a business environment.
What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?
- A . The IEEE standard covering wireless is 802.9 and they should follow this.
- B . 802.7 covers wireless standards and should be followed
- C . They should follow the 802.11 standard
- D . Frank and the other IT employees should follow the 802.1 standard.
C
Explanation:
The correct IEEE standard for wireless networking in a business environment is 802.11. This series of standards defines the protocols for implementing wireless local area network (WLAN) communications in various frequencies, including 2.4, 5, and 60 GHz bands. The 802.11 standards are widely used worldwide and form the basis of wireless network products that are marketed under the Wi-Fi brand. Frank and his colleagues should familiarize themselves with the 802.11 standards to set up a secure wireless network for their firm.
Reference: The information is based on the IEEE 802.11 series of standards, which are the foundation for Wi-Fi wireless networks. These standards have been developed to ensure interoperability between wireless devices and to provide a secure and reliable means of communication12.
If a network is at risk from unskilled individuals, what type of threat is this?
- A . External Threats
- B . Structured Threats
- C . Unstructured Threats
- D . Internal Threats
C
Explanation:
Unstructured threats typically originate from individuals who lack advanced skills or a sophisticated understanding of network systems. These threats often involve simple methods to disrupt network operations, such as basic malware attacks or exploiting known vulnerabilities that have not been patched. In the context of the Certified Network Defender (CND) program, unstructured threats are recognized as those that can be caused by unskilled individuals who may inadvertently introduce risks to the network through misconfigurations or inadequate security practices.
Reference: The Certified Network Defender (CND) curriculum addresses various types of threats, including unstructured threats, and emphasizes the importance of securing networks against all levels of skill and sophistication among potential attackers12. It also covers the need for continuous monitoring and the implementation of security best practices to mitigate the risks posed by both unstructured and structured threats34.
Which of the following network monitoring techniques requires extra monitoring software or hardware?
- A . Non-router based
- B . Switch based
- C . Hub based
- D . Router based
B
Explanation:
Switch-based network monitoring requires additional monitoring software or hardware because switches operate at the data link layer of the OSI model and do not inherently provide monitoring capabilities. To monitor traffic through a switch, network administrators must use port mirroring or a network tap, which involves configuring the switch to send a copy of the network packets to a monitoring device. This allows the monitoring device to analyze the traffic passing through the switch without interfering with the network’s normal operation. This technique is essential for deep packet inspection, intrusion detection systems, and for gaining visibility into the traffic between devices in a switched network.
Reference: The need for extra monitoring software or hardware in switch-based network monitoring is consistent with the Certified Network Defender (CND) curriculum, which emphasizes the importance of implementing robust network monitoring practices to detect and respond to security threats12. Additionally, the use of port mirroring and network taps as methods to monitor switch-based networks is a standard practice in network security, aligning with the CND’s focus on technical network security measures34.
A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access it at any time and from any location.
What is the appropriate backup method that should be implemented?
- A . Cloud backup
- B . Offsite backup
- C . Hot site backup
- D . Onsite backup
A
Explanation:
The appropriate backup method for a company that wants to ensure data encryption and accessibility from any location at any time is Cloud backup. Cloud backup solutions provide data encryption which secures the data during transmission and storage. Moreover, cloud services are designed to be accessible over the internet, allowing for remote access to the data from any location. This aligns with the company’s requirements for a secure and readily accessible backup method.
Reference: The EC-Council’s Certified Network Defender (CND) program discusses the importance of data security, including data encryption in transit and at rest, and the use of cloud environments for data backup due to their scalability, accessibility, and security features12.