312-38 Premium Bundle

312-38 Premium Bundle

EC-Council Network Security Administrator (ENSA) Certification Exam

4.5 
(51690 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

EC-Council 312-38 Free Practice Questions

It is impossible to pass EC-Council 312-38 exam without any help in the short term. Come to Testking soon and find the most advanced, correct and guaranteed EC-Council 312-38 practice questions. You will get a surprising result by our Improved EC-Council Network Security Administrator (ENSA) practice guides.

EC-Council 312-38 Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Brendan wants to implement a hardware based RAID system in his network. He is thinking of choosing a suitable RAM type for the architectural setup in the system. The type he is interested in provides access times of up to 20 ns. Which type of RAM will he select for his RAID system?

  • A. NVRAM
  • B. SDRAM
  • C. NAND flash memory
  • D. SRAM

Answer: D

NEW QUESTION 2
A local bank wants to protect their card holder data. The bank should comply with the ________ standard to ensure the security of card holder data.

  • A. HIPAA
  • B. ISEC
  • C. PCI DSS
  • D. SOAX

Answer: C

NEW QUESTION 3
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the--------------------------authentication technique to satisfy the
management request.

  • A. Two-factor Authentication
  • B. Smart Card Authentication
  • C. Single-sign-on
  • D. Biometric

Answer: C

NEW QUESTION 4
Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS. What type of detection is this network-based IDS system using?

  • A. This network-based IDS system is using anomaly detection.
  • B. This network-based IDS system is using dissimilarity algorithms.
  • C. This system is using misuse detection.
  • D. This network-based IDS is utilizing definition-based detection.

Answer: A

NEW QUESTION 5
Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?

  • A. Bastion host
  • B. Edge transport server
  • C. SOCKS hsot
  • D. Session layer firewall

Answer: A

NEW QUESTION 6
Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

  • A. Automated Field Correlation
  • B. Field-Based Approach
  • C. Rule-Based Approach
  • D. Graph-Based Approach

Answer: A

NEW QUESTION 7
An US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that require a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. What RAID level is John considering to meet this requirement?

  • A. RAID level 1
  • B. RAID level 10
  • C. RAID level 5
  • D. RAID level 50

Answer: D

NEW QUESTION 8
Identify the minimum number of drives required to setup RAID level 5.
312-38 dumps exhibit

  • A. Multiple
  • B. 3
  • C. 4
  • D. 2

Answer: B

NEW QUESTION 9
Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other. How will they ensure the authenticity of their emails?

  • A. Dan will use his public key to encrypt his mails while Alex will use Dan's digital signature to verify the authenticity of the mails.
  • B. Dan will use his private key to encrypt his mails while Alex will use his digital signature to verify the authenticity of the mails.
  • C. Dan will use his digital signature to sign his mails while Alex will use his private key to verify the authenticity of the mails.
  • D. Dan will use his digital signature to sign his mails while Alex will use Dan's public key to verify the authencity of the mails.

Answer: D

NEW QUESTION 10
George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the _________.

  • A. Archived data
  • B. Deleted data
  • C. Data in transit
  • D. Backup data

Answer: D

NEW QUESTION 11
Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an ________ for legal advice to defend
them against this allegation.

  • A. PR Specialist
  • B. Attorney
  • C. Incident Handler
  • D. Evidence Manager

Answer: B

NEW QUESTION 12
Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching. Which type of network-based IDS is Sam implementing?

  • A. Behavior-based IDS
  • B. Anomaly-based IDS
  • C. Stateful protocol analysis
  • D. Signature-based IDS

Answer: D

NEW QUESTION 13
Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless network be implemented in the office so employees can move about freely without being tied to a network cable. While Frank and his colleagues are familiar with wired Ethernet technologies, 802.3, they are not familiar with how to setup wireless in a business environment. What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?

  • A. The IEEE standard covering wireless is 802.9 and they should follow this.
  • B. 802.7 covers wireless standards and should be followed
  • C. They should follow the 802.11 standard
  • D. Frank and the other IT employees should follow the 802.1 standard.

Answer: C

NEW QUESTION 14
Tom works as a network administrator in a multinational organization having branches across North America and Europe. Tom wants to implement a storage technology that can provide centralized data storage and provide free data backup on the server. He should be able to perform data backup and recovery more efficiently with the selected technology. Which of the following storage technologies best suits Tom's requirements?

  • A. DAS
  • B. PAS
  • C. RAID
  • D. NAS

Answer: D

NEW QUESTION 15
Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented.
What is the correct hierarchy for a security policy implementation?

  • A. Laws, Policies, Regulations, Procedures and Standards
  • B. Regulations, Policies, Laws, Standards and Procedures
  • C. Laws, Regulations, Policies, Standards and Procedures
  • D. Procedures, Policies, Laws, Standards and Regulations

Answer: C

NEW QUESTION 16
James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. Which of the following Wireshark filters will he use?

  • A. lcmp.type==0 and icmp.type==16
  • B. lcmp.type==8 or icmp.type==16
  • C. lcmp.type==8 and icmp.type==0
  • D. lcmp.type==8 or icmp.type==0

Answer: D

NEW QUESTION 17
Kelly is taking backups of the organization's data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type of backup is Kelly using?

  • A. Full backup
  • B. Incremental backup
  • C. Differential Backup
  • D. Normal Backup

Answer: B

NEW QUESTION 18
You are responsible for network functions and logical security throughout the corporation. Your company has over 250 servers running Windows Server 2012, 5000 workstations running Windows 10, and 200 mobile users working from laptops on Windows 8. Last week 10 of your company's laptops were stolen from a salesman, while at a conference in Barcelona. These laptops contained proprietary company information.
While doing a damage assessment, a news story leaks about a blog post containing information about the stolen laptops and the sensitive information. What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?

  • A. You should have used 3DES.
  • B. You should have implemented the Distributed File System (DFS).
  • C. If you would have implemented Pretty Good Privacy (PGP).
  • D. You could have implemented the Encrypted File System (EFS)

Answer: D

NEW QUESTION 19
The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?

  • A. You should run the up2date -d -f -u command
  • B. You should run the up2data -u command
  • C. You should run the WSUS -d -f -u command.
  • D. You should type the sysupdate -d command

Answer: A

NEW QUESTION 20
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?

  • A. They work on the session layer.
  • B. They function on either the application or the physical layer.
  • C. They function on the data link layer
  • D. They work on the network layer

Answer: D

NEW QUESTION 21
......

P.S. Easily pass 312-38 Exam with 330 Q&As 2passeasy Dumps & pdf Version, Welcome to Download the Newest 2passeasy 312-38 Dumps: https://www.2passeasy.com/dumps/312-38/ (330 New Questions)


START 312-38 EXAM