312-38題庫資訊 & 312-38試題EC-COUNCIL 312-38 認證考試是個檢驗IT專業知識的認證考試。VCESoft是個能幫你快速通過EC-COUNCIL 312-38 認證考試的網站。在您考試之前使用我們提供的針對性培訓和測試練習題和答案,短時間內你會有很大的收穫。 最新的 Certified Ethical Hacker 312-38 免費考試真題 (Q220-Q225):問題 #220
How many layers are present in the OSI layer model?
A. 0
B. 1
C. 2
D. 3
答案:D
問題 #221
To secure his company's network, Tim the network admin, installed a security device that inspected all inbound and outbound network traffic for suspicious patterns. The device was configured to alert him if it found any such suspicious activity. Identify the type of network security device installed by Tim?
A. Honeypot
B. Proxy server
C. Intrusion Detection System (IDS)
D. Firewall
答案:C
解題說明:
The network security device described is an Intrusion Detection System (IDS). An IDS monitors all inbound and outbound network traffic for suspicious patterns and is configured to alert the network administrator if it detects any such activity. This aligns with the primary function of an IDS, which is to serve as a monitoring system, not necessarily to block traffic like a firewall or act as a decoy like a honeypot. It differs from a proxy server, which would primarily manage and forward web requests on behalf of clients. The IDS operates by analyzing traffic and identifying potential threats based on known signatures or anomalies in network behavior, thereby enabling the network admin to take appropriate action to secure the network.
問題 #222
The SNMP contains various commands that reduce the burden on the network administrators.
Which of the following commands is used by SNMP agents to notify SNMP managers about an event occurring in the network?
A. TRAPS
B. SET
C. INFORM
D. RESPONSE
答案:A
問題 #223
Rosa is working as a network defender at Linda Systems. Recently, the company migrated from Windows to MacOS. Rosa wants to view the security related logs of her system, where con she find these logs?
A. /private/var/log
B. /var/log/cups/access-log
C. /Library/Logs
D. /Library/Logs/Sync
答案:A
解題說明:
In MacOS, security-related logs are typically stored in the /private/var/log directory. This location is used to store various system logs, including authentication attempts and other security events. The secure.log file within this directory is particularly relevant for tracking security incidents, as it records authentication attempts and other security-related events. It's important for network defenders like Rosa to be familiar with these log locations to monitor and respond to potential security issues on the systems they manage12.
References: The information provided here is consistent with standard MacOS logging practices and the EC-Council's Certified Network Defender (CND) curriculum, which includes understanding the security mechanisms of different operating systems and how to locate and interpret system logs12. For more detailed information, please refer to the official CND study materials and documents provided by the EC-Council.
問題 #224
Which of the following commands can be used to disable unwanted services on Debian, Ubuntu and other Debian-based Linux distributions?
A. # chkconfig [service name] -del
B. # service [service name] stop
C. # update-rc.d -f [service name] remove
D. # chkconfig [service name]off
答案:C
解題說明:
In Debian-based Linux distributions, such as Ubuntu, the update-rc.d command is used to add and remove services from the startup sequence. To disable a service, the -f option (which stands for 'force') is used along with the remove parameter to remove the service from the startup sequence. This prevents the service from starting automatically during the system boot.