Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

EC-Council: Exam Questions 312-38

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Certshared now are offering 100% pass ensure 312-38 dumps!

https://www.certshared.com/exam/312-38/ (177 Q&As)

EC-Council
Exam Questions 312-38
EC-Council Network Security Administrator (ENSA)

Guaranteed success with Our exam guides visit - https://www.certshared.com


Certshared now are offering 100% pass ensure 312-38 dumps!
https://www.certshared.com/exam/312-38/ (177 Q&As)

NEW QUESTION 1
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain
restricted zones without proper credentials. Which of following physical security measures should the administrator use?

A. Bollards
B. Fence
C. Video surveillance
D. Mantrap

Answer: B

NEW QUESTION 2
Identify the correct statements regarding a DMZ zone:

A. It is a file integrity monitoring mechanism


B. It is a Neutral zone between a trusted network and an untrusted network
C. It serves as a proxy
D. It includes sensitive internal servers such as database servers

Answer: B

NEW QUESTION 3
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New
England and the headquarters in Boston where Fred works.
The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators.
Because of this, Fred's supervisor wants to implement
tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed
on all computers throughout the company and
monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of
solution does Fred's boss want to implement?

A. Fred's boss wants a NIDS implementation.


B. Fred's boss wants Fred to monitor a NIPS system.
C. Fred's boss wants to implement a HIPS solution.
D. Fred's boss wants to implement a HIDS solution.

Answer: D

NEW QUESTION 4
Kelly is taking backups of the organization's data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type
of backup is Kelly using?

A. Full backup
B. Incremental backup
C. Differential Backup
D. Normal Backup

Answer: B

NEW QUESTION 5
A local bank wants to protect their card holder data. The bank should comply with the ________ standard to ensure the security of card holder data.

A. HIPAA
B. ISEC
C. PCI DSS
D. SOAX

Answer: C

NEW QUESTION 6
Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor.
Certain parameters are required before calculating risk factor. What are they? (Select all that apply) Risk factor =.............X...............X...........

A. Vulnerability
B. Impact
C. Attack
D. Threat

Answer: ABD

NEW QUESTION 7
James wants to implement certain control measures to prevent denial-of-service attacks against the organization. Which of the following control measures can help
James?

A. Strong passwords

Guaranteed success with Our exam guides visit - https://www.certshared.com


Certshared now are offering 100% pass ensure 312-38 dumps!
https://www.certshared.com/exam/312-38/ (177 Q&As)

B. Reduce the sessions time-out duration for the connection attempts


C. A honeypot in DMZ
D. Provide network-based anti-virus

Answer: B

NEW QUESTION 8
Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.

A. FHSS
B. DSSS
C. OFDM
D. ISM

Answer: B

NEW QUESTION 9
Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control
measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?

A. Discretionary access control


B. Mandatory access control
C. Non-discretionary access control
D. Role-based access control

Answer: A

NEW QUESTION 10
Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the
allegations and consulted a/an ________ for legal advice to defend
them against this allegation.

A. PR Specialist
B. Attorney
C. Incident Handler
D. Evidence Manager

Answer: B

NEW QUESTION 10
The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to
avoid a future occurrence of the malware incident.
Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)

A. Complying with the company's security policies


B. Implementing strong authentication schemes
C. Implementing a strong password policy
D. Install antivirus software

Answer: D

NEW QUESTION 15
Which OSI layer does a Network Interface Card (NIC) work on?

A. Physical layer
B. Presentation layer
C. Network layer
D. Session layer

Answer: A

NEW QUESTION 18
A company wants to implement a data backup method which allows them to encrypt the data ensuring its security as well as access at any time and from any
location. What is the appropriate backup method that should be implemented?

A. Onsite backup
B. Hot site backup
C. Offsite backup
D. Cloud backup

Answer: D

NEW QUESTION 20
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement
the--------------------------authentication technique to satisfy the

Guaranteed success with Our exam guides visit - https://www.certshared.com


Certshared now are offering 100% pass ensure 312-38 dumps!
https://www.certshared.com/exam/312-38/ (177 Q&As)

management request.

A. Two-factor Authentication
B. Smart Card Authentication
C. Single-sign-on
D. Biometric

Answer: C

NEW QUESTION 23
James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all
over the state. Most communication between the company schools, and lenders is carried out through emails. Much of the email communication used at his
company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not
an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?

A. James could use PGP as a free option for encrypting the company's emails.
B. James should utilize the free OTP software package.
C. James can use MD5 algorithm to encrypt all the emails
D. James can enforce mandatory HTTPS in the email clients to encrypt emails

Answer: A

NEW QUESTION 25
The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating
Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol
header. What mode of ESP does Jacob need to use to encrypt the IP traffic?

A. He should use ESP in transport mode.


B. Jacob should utilize ESP in tunnel mode.
C. Jacob should use ESP in pass-through mode.
D. He should use ESP in gateway mode

Answer: B

NEW QUESTION 28
Alex is administrating the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?

A. Netstat -o
B. Netstat -a
C. Netstat -ao
D. Netstat -an

Answer: D

NEW QUESTION 32
David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals
of the company. David suggests the ________ framework, as it provides a set of controls over IT and consolidates them to form a framework.

A. RMIS
B. ITIL
C. ISO 27007
D. COBIT

Answer: D

NEW QUESTION 34
Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected
to N21 and N22. What will happen if any one of the main nodes fail?

A. Failure of the main node affects all other child nodes at the same level irrespective of the main node.
B. Does not cause any disturbance to the child nodes or its tranmission
C. Failure of the main node will affect all related child nodes connected to the main node
D. Affects the root node only

Answer: C

NEW QUESTION 36
Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response.
Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

A. Extreme severity level


B. Low severity level
C. Mid severity level
D. High severity level

Answer: B

Guaranteed success with Our exam guides visit - https://www.certshared.com


Certshared now are offering 100% pass ensure 312-38 dumps!
https://www.certshared.com/exam/312-38/ (177 Q&As)

NEW QUESTION 37
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

A. Pipe Model
B. AAA model
C. Hub-and-Spoke VPN model
D. Hose mode

Answer: A

NEW QUESTION 41
Which of the information below can be gained through network sniffing? (Select all that apply)

A. Telnet Passwords
B. Syslog traffic
C. DNS traffic
D. Programming errors

Answer: ABC

NEW QUESTION 46
Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company
could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for
abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS. What type of detection is this
network-based IDS system using?

A. This network-based IDS system is using anomaly detection.


B. This network-based IDS system is using dissimilarity algorithms.
C. This system is using misuse detection.
D. This network-based IDS is utilizing definition-based detection.

Answer: A

NEW QUESTION 51
The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible
for providing communication in the TCP/IP stack.

A. RARP
B. ICMP
C. DHCP
D. ARP

Answer: B

NEW QUESTION 54
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?

A. Mitigation
B. Assessment
C. Remediation
D. Verification

Answer: C

NEW QUESTION 57
Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that
are involved. What is the last step he should list?

A. Containment
B. Assign eradication
C. A follow-up
D. Recovery

Answer: C

NEW QUESTION 62
Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to
communicate with each other, the traffic is
encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation
occurs only in the _________ implementation of a VPN.

A. Full Mesh Mode


B. Point-to-Point Mode
C. Transport Mode
D. Tunnel Mode

Answer:

Guaranteed success with Our exam guides visit - https://www.certshared.com


Certshared now are offering 100% pass ensure 312-38 dumps!
https://www.certshared.com/exam/312-38/ (177 Q&As)

NEW QUESTION 63
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a _______ identified which
helps measure how risky an activity is.

A. Risk Severity
B. Risk Matrix
C. Key Risk Indicator
D. Risk levels

Answer: C

NEW QUESTION 65
Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with
each other to determine the correlation across one or multiple fields?

A. Automated Field Correlation


B. Field-Based Approach
C. Rule-Based Approach
D. Graph-Based Approach

Answer: A

NEW QUESTION 67
Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video
cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people
piggybacking employees. What should she install to prevent piggybacking?

A. She should install a mantrap


B. Justine needs to install a biometrics station at each entrance
C. Justine will need to install a revolving security door
D. She should install a Thompson Trapdoor.

Answer: A

NEW QUESTION 72
Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm.
The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely without being tied to a network
cable. While Frank and his colleagues are familiar with wired Ethernet technologies, 802.3, they are not familiar with how to setup wireless in a business
environment. What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?

A. The IEEE standard covering wireless is 802.9 and they should follow this.
B. 802.7 covers wireless standards and should be followed
C. They should follow the 802.11 standard
D. Frank and the other IT employees should follow the 802.1 standard.

Answer: C

NEW QUESTION 77
John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the
router. Which command will John use to enable NetFlow on an interface?

A. Router(Config-if) # IP route - cache flow


B. Router# Netmon enable
C. Router IP route
D. Router# netflow enable

Answer: A

NEW QUESTION 79
Which of the following is a best practice for wireless network security?

A. Enabling the remote router login


B. Do not changing the default SSID
C. Do not placing packet filter between the AP and the corporate intranet
D. Using SSID cloaking

Answer: D

NEW QUESTION 81
......

Guaranteed success with Our exam guides visit - https://www.certshared.com


Certshared now are offering 100% pass ensure 312-38 dumps!
https://www.certshared.com/exam/312-38/ (177 Q&As)

Thank You for Trying Our Product

We offer two products:

1st - We have Practice Tests Software with Actual Exam Questions

2nd - Questons and Answers in PDF Format

312-38 Practice Exam Features:

* 312-38 Questions and Answers Updated Frequently

* 312-38 Practice Questions Verified by Expert Senior Certified Staff

* 312-38 Most Realistic Questions that Guarantee you a Pass on Your FirstTry

* 312-38 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year

100% Actual & Verified — Instant Download, Please Click


Order The 312-38 Practice Test Here

Guaranteed success with Our exam guides visit - https://www.certshared.com


Powered by TCPDF (www.tcpdf.org)

You might also like