312-38 Free Sample Questions

Certified Network Defender Practice Test
9/528 questions · Unlock full access
Q1

John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.

Question image
Q2

Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient.

Q3

Fill in the blank with the appropriate term. A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.

Q4Multiple answers

Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.

Q5Multiple answers

In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.

Q6

Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?

Q7

Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?

Q8

Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.

Q9

Fill in the blank with the appropriate term. The _____________is an application layer protocol that is used between workstations and routers for transporting SNA/NetBIOS traffic over TCP sessions.