312-38 | How Many Questions Of 312-38 Testing Software

It is impossible to pass EC-Council 312-38 exam without any help in the short term. Come to Examcollection soon and find the most advanced, correct and guaranteed EC-Council 312-38 practice questions. You will get a surprising result by our Down to date EC-Council Network Security Administrator (ENSA) practice guides.

Free demo questions for EC-Council 312-38 Exam Dumps Below:

NEW QUESTION 1
Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs responds with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?

  • A. The type of scan she is usinq is called a NULL scan.
  • B. Cindy is using a half-open scan to find live hosts on her network.
  • C. Cindy is attempting to find live hosts on her company's network by using a XMAS scan.
  • D. She is utilizing a RST scan to find live hosts that are listening on her network.

Answer: B

NEW QUESTION 2
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?

  • A. Application level gateway
  • B. Circuit level gateway
  • C. Stateful Multilayer Inspection
  • D. Packet Filtering

Answer: B

NEW QUESTION 3
Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?

  • A. ISO/IEC 27004
  • B. ISO/IEC 27002
  • C. ISO/IEC 27006
  • D. ISO/IEC 27005

Answer: D

NEW QUESTION 4
John has implemented _______ in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.

  • A. DMZ
  • B. Proxies
  • C. VPN
  • D. NAT

Answer: D

NEW QUESTION 5
If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

  • A. Water
  • B. Wet chemical
  • C. Dry chemical
  • D. Raw chemical

Answer: C

NEW QUESTION 6
Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?

  • A. Discretionary access control
  • B. Mandatory access control
  • C. Non-discretionary access control
  • D. Role-based access control

Answer: A

NEW QUESTION 7
A company wants to implement a data backup method which allows them to encrypt the data ensuring its security as well as access at any time and from any location. What is the appropriate backup method that should be implemented?

  • A. Onsite backup
  • B. Hot site backup
  • C. Offsite backup
  • D. Cloud backup

Answer: D

NEW QUESTION 8
Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?

  • A. Normal backup
  • B. Warm backup
  • C. Hot backup
  • D. Cold backup

Answer: C

NEW QUESTION 9
Jason has set a firewall policy that allows only a specific list of network services and deny everything else. This strategy is known as a _______.

  • A. Default allow
  • B. Default deny
  • C. Default restrict
  • D. Default access

Answer: B

NEW QUESTION 10
John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?

  • A. Application layer
  • B. Network Interface layer
  • C. TCP layer
  • D. IP layer

Answer: D

NEW QUESTION 11
Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. What is the last step he should list?

  • A. Containment
  • B. Assign eradication
  • C. A follow-up
  • D. Recovery

Answer: C

NEW QUESTION 12
Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching. Which type of network-based IDS is Sam implementing?

  • A. Behavior-based IDS
  • B. Anomaly-based IDS
  • C. Stateful protocol analysis
  • D. Signature-based IDS

Answer: D

NEW QUESTION 13
Katie has implemented the RAID level that split data into blocks and evenly write the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of _______ in order to setup.

  • A. Four drives
  • B. Three drives
  • C. Two drives
  • D. Six drives

Answer: C

NEW QUESTION 14
Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.

  • A. Ring
  • B. Mesh
  • C. Bus
  • D. Star

Answer: A

NEW QUESTION 15
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?

  • A. Application level gateway
  • B. Stateful Multilayer Inspection
  • C. Circuit level gateway
  • D. Packet Filtering

Answer: C

NEW QUESTION 16
A company has the right to monitor the activities of their employees on different information systems according to the _______ policy.

  • A. Information system
  • B. User access control
  • C. Internet usage
  • D. Confidential data

Answer: B

NEW QUESTION 17
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a _______ as it seperates the storage units from the servers and the user network.

  • A. SAN
  • B. SCSA
  • C. NAS
  • D. SAS

Answer: A

NEW QUESTION 18
Which IEEE standard does wireless network use?

  • A. 802.11
  • B. 802.18
  • C. 802.9
  • D. 802.10

Answer: A

NEW QUESTION 19
Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is
encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the _________ implementation of a VPN.

  • A. Full Mesh Mode
  • B. Point-to-Point Mode
  • C. Transport Mode
  • D. Tunnel Mode

Answer: D

NEW QUESTION 20
An US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that require a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. What RAID level is John considering to meet this requirement?

  • A. RAID level 1
  • B. RAID level 10
  • C. RAID level 5
  • D. RAID level 50

Answer: D

NEW QUESTION 21
Identify the password cracking attempt involving precomputed hash values stored as plaintext and using these to crack the password.

  • A. Bruteforce
  • B. Rainbow table
  • C. Dictionary
  • D. Hybrid

Answer: B

NEW QUESTION 22
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works.
The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement
tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and
monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of solution does Fred's boss want to implement?

  • A. Fred's boss wants a NIDS implementation.
  • B. Fred's boss wants Fred to monitor a NIPS system.
  • C. Fred's boss wants to implement a HIPS solution.
  • D. Fred's boss wants to implement a HIDS solution.

Answer: D

NEW QUESTION 23
Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. Which step should Malone list as the last step in the incident response methodology?

  • A. Malone should list a follow-up as the last step in the methodology
  • B. Recovery would be the correct choice for the last step in the incident response methodology
  • C. He should assign eradication to the last step.
  • D. Containment should be listed on Malone's plan for incident response.

Answer: B

NEW QUESTION 24
......

100% Valid and Newest Version 312-38 Questions & Answers shared by Surepassexam, Get Full Dumps HERE: https://www.surepassexam.com/312-38-exam-dumps.html (New 330 Q&As)