Rebirth EC-Council Network Security Administrator (ENSA) 312-38 Pdf Exam
we provide Realistic EC-Council 312-38 braindumps which are the best for clearing 312-38 test, and to get certified by EC-Council EC-Council Network Security Administrator (ENSA). The 312-38 Questions & Answers covers all the knowledge points of the real 312-38 exam. Crack your EC-Council 312-38 Exam with latest dumps, guaranteed!
Check 312-38 free dumps before getting the full version:
NEW QUESTION 1
David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the ________ framework, as it provides a set of controls over IT and consolidates them to form a framework.
- A. RMIS
- B. ITIL
- C. ISO 27007
- D. COBIT
Answer: D
NEW QUESTION 2
John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?
- A. Application layer
- B. Network Interface layer
- C. TCP layer
- D. IP layer
Answer: D
NEW QUESTION 3
Which OSI layer does a Network Interface Card (NIC) work on?
- A. Physical layer
- B. Presentation layer
- C. Network layer
- D. Session layer
Answer: A
NEW QUESTION 4
During a security awareness program, management was explaining the various reasons which create threats to network security. Which could be a possible threat to network security?
- A. Configuring automatic OS updates
- B. Having a web server in the internal network
- C. Implementing VPN
- D. Patch management
Answer: B
NEW QUESTION 5
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?
- A. Mitigation
- B. Assessment
- C. Remediation
- D. Verification
Answer: C
NEW QUESTION 6
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a _______ identified which helps measure how risky an activity is.
- A. Risk Severity
- B. Risk Matrix
- C. Key Risk Indicator
- D. Risk levels
Answer: C
NEW QUESTION 7
Larry is responsible for the company's network consisting of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to control the email internally. Larry likes this idea because it will give him more control over the email. Larry wants to purchase a server for email but does not want the server to be on the internal network due to the potential to cause security risks. He decides to place the server outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect traffic from accessing the email server. The server will be placed between the two firewalls. What logical area is Larry putting the new email server into?
- A. He is going to place the server in a Demilitarized Zone (DMZ)
- B. He will put the email server in an IPsec zone.
- C. Larry is going to put the email server in a hot-server zone.
- D. For security reasons, Larry is going to place the email server in the company's Logical Buffer Zone (LBZ).
Answer: A
NEW QUESTION 8
An organization needs to adhere to the ________ rules for safeguarding and protecting the electronically stored health information of employees.
- A. HI PA A
- B. PCI DSS
- C. ISEC
- D. SOX
Answer: A
NEW QUESTION 9
John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a _______ and it has to adhere to the ________
- A. Verification, Security Policies
- B. Mitigation, Security policies
- C. Vulnerability scanning, Risk Analysis
- D. Risk analysis, Risk matrix
Answer: A
NEW QUESTION 10
Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server's data daily to ensure nothing is lost. The power in the company's office is not always reliable, Kyle needs to make sure the servers do not go down or are without power for too long. Kyle decides to purchase an Uninterruptible Power Supply (UPS) that has a pair of inverters and converters to charge the battery and provides power when needed. What type of UPS has Kyle purchased?
- A. Kyle purchased a Ferro resonant Standby UPS.
- B. Kyle purchased a Line-Interactive UPS
- C. He has bought a Standby UPS
- D. He purchased a True Online UPS.
Answer: C
NEW QUESTION 11
Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching. Which type of network-based IDS is Sam implementing?
- A. Behavior-based IDS
- B. Anomaly-based IDS
- C. Stateful protocol analysis
- D. Signature-based IDS
Answer: D
NEW QUESTION 12
Identify the minimum number of drives required to setup RAID level 5.
- A. Multiple
- B. 3
- C. 4
- D. 2
Answer: B
NEW QUESTION 13
Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle on?
- A. Ivan settled on the private encryption method.
- B. Ivan settled on the symmetric encryption method.
- C. Ivan settled on the asymmetric encryption method
- D. Ivan settled on the hashing encryption method
Answer: C
NEW QUESTION 14
What is the name of the authority that verifies the certificate authority in digital certificates?
- A. Directory management system
- B. Certificate authority
- C. Registration authority
- D. Certificate Management system
Answer: D
NEW QUESTION 15
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?
- A. Application level gateway
- B. Stateful Multilayer Inspection
- C. Circuit level gateway
- D. Packet Filtering
Answer: C
NEW QUESTION 16
A network administrator is monitoring the network traffic with Wireshark. Which of the following filters will she use to view the packets moving without setting a flag to detect TCP Null Scan attempts?
- A. TCRflags==0x000
- B. Tcp.flags==0X029
- C. Tcp.dstport==7
- D. Tcp.flags==0x003
Answer: A
NEW QUESTION 17
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?
- A. Star
- B. Point-to-Point
- C. Full Mesh
- D. Hub-and-Spoke
Answer: D
NEW QUESTION 18
Identify the network topology where each computer acts as a repeater and the data passes from one computer to the other in a single direction until it reaches the destination.
- A. Ring
- B. Mesh
- C. Bus
- D. Star
Answer: A
NEW QUESTION 19
Alex is administrating the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?
- A. Netstat -o
- B. Netstat -a
- C. Netstat -ao
- D. Netstat -an
Answer: D
NEW QUESTION 20
James wants to implement certain control measures to prevent denial-of-service attacks against the organization. Which of the following control measures can help James?
- A. Strong passwords
- B. Reduce the sessions time-out duration for the connection attempts
- C. A honeypot in DMZ
- D. Provide network-based anti-virus
Answer: B
NEW QUESTION 21
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works.
The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement
tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and
monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of solution does Fred's boss want to implement?
- A. Fred's boss wants a NIDS implementation.
- B. Fred's boss wants Fred to monitor a NIPS system.
- C. Fred's boss wants to implement a HIPS solution.
- D. Fred's boss wants to implement a HIDS solution.
Answer: D
NEW QUESTION 22
The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?
- A. You should run the up2date -d -f -u command
- B. You should run the up2data -u command
- C. You should run the WSUS -d -f -u command.
- D. You should type the sysupdate -d command
Answer: A
NEW QUESTION 23
Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?
- A. Their first step is to analyze the data they have currently gathered from the company or interviews.
- B. Their first step is to make a hypothesis of what their final findings will be.
- C. Their first step is to create an initial Executive report to show the management team.
- D. Their first step is the acquisition of required documents, reviewing of security policies and compliance.
Answer: D
NEW QUESTION 24
......
Recommend!! Get the Full 312-38 dumps in VCE and PDF From Thedumpscentre.com, Welcome to Download: https://www.thedumpscentre.com/312-38-dumps/ (New 330 Q&As Version)