Visit Official SkillCertPro Website :-
Council Certified Network Defender (CNDv2) Practice Tests 2023. Contains 350+ exam questions to pass the exam in first attempt.
For a full set of 350+ questions. Go to
https://skillcertpro.com/product/council-certified-network-defender-cndv2-exam-questions/
SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
SkillCertPro updates exam questions every 2 weeks.
You will get life time access and life time free updates
SkillCertPro assures 100% pass guarantee in first attempt.
Question 1:
Rick has implemented several firewalls and IDS systems across his enterprise network. What should he do to effectively correlate all incidents that pass through these security controls?
A. Implement Simple Network Management Protocol (SNMP)
B. Implement IPsec
C. Use firewalls in Network Address Transition (NAT) mode
D. Use Network Time Protocol (NTP)
Answer: D
Explanation:
https://en.wikipedia.org/wiki/Network_Time_Protocol
The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. NTP will help Rick to synchronize everything in time.
Question 2:
What is the best way to describe a mesh network topology?
A. A network in which every computer in the network can communicate with a single central computer.
B. A network is extremely cost efficient, offering the best option for allowing computers to communicate amongst each other.
C. A network in which every computer meshes together to form a hybrid between a star and bus topology.
D. A network in which every computer in the network has a connection to each and every computer in the network.
Answer: D
Explanation:
https://en.wikipedia.org/wiki/Mesh_networking
A mesh network (or simply meshnet) is a local network topology in which the infrastructure nodes (i.e., bridges, switches, and other infrastructure devices) connect directly, dynamically, and non-hierarchically to as many other nodes as possible and cooperate to efficiently route data from/to clients. This lack of dependency on one node allows for every node to participate in the relay of information. Mesh networks dynamically self-organize and self-configure, which can reduce installation overhead. The ability to self-configure enables the dynamic distribution of workloads, particularly in the event a few nodes should fail. This, in turn, contributes to fault-tolerance and reduced maintenance costs.
Incorrect answers:
A network is extremely cost efficient, offering the best option for allowing computers to communicate amongst each other. Incorrect because mesh topology is not extremely cost-effective.
Question 3:
A company has the right to monitor the activities of their employees on different information systems according to the _________ policy.
A. User access control
B. Information system
C. Confidential data
D. Internet usage
Answer: A
Explanation:
User access control policy is to provide a framework for how user accounts and privileges are created, managed and deleted. It includes how new users are authorised and granted appropriate privileges, as well as how these are reviewed and revoked when necessary and includes appropriate controls to prevent users from obtaining unauthorised privileges or access.
Question 4:
An organization’s web server was recently compromised triggering its admin team into action to defend the network. The admin team wants to place the web server in such a way that, even if it is attacked, the other network resources will be unavailable to the attacker. Moreover, the network monitoring will easily detect the future attacks. How can the admin team implement this plan?
A. They can place it in a separate DMZ area behind the firewall
B. They can place it beside the firewall
C. They can remove the web server from their organization
D. They can place the web server outside of the organization in a remote place
Answer: A
Explanation:
DMZ or demilitarized zone (sometimes referred to as a perimeter network or screened subnet) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to an untrusted, usually larger, network such as the Internet. The purpose of a DMZ is to add a layer of security to an organization’s local area network (LAN): an external network node can access only what is exposed in the DMZ. In contrast, the rest of the organization’s network is firewalled—the DMZ functions as a small, isolated network positioned between the Internet and the private network.
Question 5:
Identify the minimum number of drives required to setup RAID 5.
A. 4
B. 3
C. 5
D. 2
Answer: B
Explanation:
https://en.wikipedia.org/wiki/Standard_RAID_levels#RAID_5
RAID 5 consists of block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives, but one be present to operate. Upon failure of a single drive, subsequent reads can be calculated from the distributed parity such that no data is lost. RAID 5 requires at least three disks.
For a full set of 350+ questions. Go to
https://skillcertpro.com/product/council-certified-network-defender-cndv2-exam-questions/
SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
SkillCertPro updates exam questions every 2 weeks.
You will get life time access and life time free updates
SkillCertPro assures 100% pass guarantee in first attempt.
Question 6:
Daniel works as a network administrator in an Information Security company. He has just deployed an IDS in his organization’s network and wants to calculate the false positive rate for his implementation. Which of the following formulae can he use to so?
A. False Negative/False Negative+True Positive
B. True Negative/False Negative+True Positive
C. False Negative/True Negative+True positive
D. False Positive/False Positive+True Negative
Answer: D
Explanation:
https://en.wikipedia.org/wiki/False_positive_rate
The False Positive Rate is the frequency with which the IDS reports malicious activity in error. These errors are the bane of a security administrator’s existence. They’re the “nuisance reports” that require investigation but lead to a dead end. The true danger of a high false-positive rate lies in the fact that it may cause administrators to ignore the system’s output when legitimate alerts are raised. Generally speaking, increasing the sensitivity of an intrusion-detection system results in a higher false-positive rate, while decreasing the sensitivity lowers the false positive rate.
Question 7:
Kelly is taking backups of the organization’s data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type of backup is Kelly using?
A. Incremental backup
B. Normal Backup
C. Full backup
D. Differential Backup
Answer: A
Question 8:
Which of the following Wireshark filters can a network administrator use to view the packets without any flags set in order to detect TCP Null Scan attempts?
A. TCP.flags==0x000
B. tcp.flags==0x003
C. tcp.dstport==7
D. tcp.flags==0X029
Answer: A
Question 9:
David, a network and system admin, encrypted all the files in a Windows system that supports NTFS file system using Encrypted File Systems (EFS). He then backed up the same files into another Windows system that supports FAT file system. Later, he found that the backup files were not encrypted. What could be the reason for this?
A. EFS is not the encryption system used in Windows
B. Copied files loses their encryption
C. EFS could only encrypt the files that follow NTFS
D. FAT files cannot be encrypted
Answer: C
Question 10:
Which of the following network security controls can an administrator use to detect, deflect or study attempts to gain unauthorized access to information systems?
A. Honeypot
B. Network Protocol Analyzer
C. Proxy Server
D. IDS/IPS
Answer: A
For a full set of 350+ questions. Go to
https://skillcertpro.com/product/council-certified-network-defender-cndv2-exam-questions/
SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
SkillCertPro updates exam questions every 2 weeks.
You will get life time access and life time free updates
SkillCertPro assures 100% pass guarantee in first attempt.