312-38 Exam Questions - Online Test


312-38 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Proper study guides for Most recent EC-Council EC-Council Network Security Administrator (ENSA) certified begins with EC-Council 312-38 preparation products which designed to deliver the Breathing 312-38 questions by making you pass the 312-38 test at your first time. Try the free 312-38 demo right now.

Free 312-38 Demo Online For EC-Council Certifitcation:

NEW QUESTION 1
Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.

  • A. FHSS
  • B. DSSS
  • C. OFDM
  • D. ISM

Answer: B

NEW QUESTION 2
Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium?

  • A. Capability
  • B. Accountability
  • C. Extensibility
  • D. Reliability

Answer: ACD

NEW QUESTION 3
John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?

  • A. Router(Config-if) # IP route - cache flow
  • B. Router# Netmon enable
  • C. Router IP route
  • D. Router# netflow enable

Answer: A

NEW QUESTION 4
Sam wants to implement a network-based IDS in the network. Sam finds out the one IDS solution which works is based on patterns matching. Which type of network-based IDS is Sam implementing?

  • A. Behavior-based IDS
  • B. Anomaly-based IDS
  • C. Stateful protocol analysis
  • D. Signature-based IDS

Answer: D

NEW QUESTION 5
A network is setup using an IP address range of 0.0.0.0 to 127.255.255.255. The network has a default subnet mask of 255.0.0.0. What IP address class is the network range a part of?

  • A. Class C
  • B. Class A
  • C. Class B
  • D. Class D

Answer: B

NEW QUESTION 6
Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?

  • A. Bastion host
  • B. Edge transport server
  • C. SOCKS hsot
  • D. Session layer firewall

Answer: A

NEW QUESTION 7
George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the _________.

  • A. Archived data
  • B. Deleted data
  • C. Data in transit
  • D. Backup data

Answer: D

NEW QUESTION 8
------------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

  • A. 802.15
  • B. 802.16
  • C. 802.15.4
  • D. 802.12

Answer: B

NEW QUESTION 9
If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

  • A. Water
  • B. Wet chemical
  • C. Dry chemical
  • D. Raw chemical

Answer: C

NEW QUESTION 10
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

  • A. Pipe Model
  • B. AAA model
  • C. Hub-and-Spoke VPN model
  • D. Hose mode

Answer: A

NEW QUESTION 11
Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS. What type of detection is this network-based IDS system using?

  • A. This network-based IDS system is using anomaly detection.
  • B. This network-based IDS system is using dissimilarity algorithms.
  • C. This system is using misuse detection.
  • D. This network-based IDS is utilizing definition-based detection.

Answer: A

NEW QUESTION 12
Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?

  • A. Normal backup
  • B. Warm backup
  • C. Hot backup
  • D. Cold backup

Answer: C

NEW QUESTION 13
Michael decides to view the-----------------to track employee actions on the organization's network.

  • A. Firewall policy
  • B. Firewall log
  • C. Firewall settings
  • D. Firewall rule set

Answer: B

NEW QUESTION 14
The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?

  • A. Bollards
  • B. Fence
  • C. Video surveillance
  • D. Mantrap

Answer: B

NEW QUESTION 15
The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?

  • A. You should run the up2date -d -f -u command
  • B. You should run the up2data -u command
  • C. You should run the WSUS -d -f -u command.
  • D. You should type the sysupdate -d command

Answer: A

NEW QUESTION 16
Identify the minimum number of drives required to setup RAID level 5.
312-38 dumps exhibit

  • A. Multiple
  • B. 3
  • C. 4
  • D. 2

Answer: B

NEW QUESTION 17
Will is working as a Network Administrator. Management wants to maintain a backup of all the company data as soon as it starts operations. They decided to use a RAID backup storage technology for their data backup plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data written to one disk is copied automatically to the other disk as well. This maintains an additional copy of the data.
Which RAID level is used here?

  • A. RAID 3
  • B. RAID 1
  • C. RAID 5
  • D. RAID 0

Answer: B

NEW QUESTION 18
Which of the information below can be gained through network sniffing? (Select all that apply)

  • A. Telnet Passwords
  • B. Syslog traffic
  • C. DNS traffic
  • D. Programming errors

Answer: ABC

NEW QUESTION 19
......

P.S. Easily pass 312-38 Exam with 177 Q&As DumpSolutions.com Dumps & pdf Version, Welcome to Download the Newest DumpSolutions.com 312-38 Dumps: https://www.dumpsolutions.com/312-38-dumps/ (177 New Questions)