ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Related questions











Which protocol could choose the network administrator for the wireless network design, if he need to satisfied the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data rate and use DSSS for modulation.

A.
802.11n
A.
802.11n
Answers
B.
802.11g
B.
802.11g
Answers
C.
802.11b
C.
802.11b
Answers
D.
802.11a
D.
802.11a
Answers
Suggested answer: C

Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and warning signs.

A.
Technical control
A.
Technical control
Answers
B.
Environmental control
B.
Environmental control
Answers
C.
Physical control
C.
Physical control
Answers
D.
Administrative control
D.
Administrative control
Answers
Suggested answer: D

Which Internet access policy starts with all services blocked and the administrator enables safe and necessary services individually, which provides maximum security and logs everything, such as system and network activities?

A.
Internet access policy
A.
Internet access policy
Answers
B.
Paranoid policy
B.
Paranoid policy
Answers
C.
Permissive policy
C.
Permissive policy
Answers
D.
Prudent policy
D.
Prudent policy
Answers
Suggested answer: D

Daniel who works as a network administrator has just deployed an IDS in his organization's network. He wants to calculate the False Positive rate for his implementation. Which of the following formulas will he use, to calculate the False Positive rate?

A.
False Negative/True Negative+True Positive
A.
False Negative/True Negative+True Positive
Answers
B.
False Positive/False Positive+True Negative
B.
False Positive/False Positive+True Negative
Answers
C.
True Negative/False Negative+True Positive
C.
True Negative/False Negative+True Positive
Answers
D.
False Negative/False Negative+True Positive
D.
False Negative/False Negative+True Positive
Answers
Suggested answer: B

The SNMP contains various commands that reduce the burden on the network administrators. Which of the following commands is used by SNMP agents to notify SNMP managers about an event occurring in the network?

A.
INFORM
A.
INFORM
Answers
B.
RESPONSE
B.
RESPONSE
Answers
C.
TRAPS
C.
TRAPS
Answers
D.
SET
D.
SET
Answers
Suggested answer: C

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's __________ integrity check mechanism provides security against a replay attack.

A.
CBC-MAC
A.
CBC-MAC
Answers
B.
CRC-MAC
B.
CRC-MAC
Answers
C.
CBC-32
C.
CBC-32
Answers
D.
CRC-32
D.
CRC-32
Answers
Suggested answer: A

Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?

A.
Session layer firewall.
A.
Session layer firewall.
Answers
B.
SOCKS host.
B.
SOCKS host.
Answers
C.
Bastion host.
C.
Bastion host.
Answers
D.
Edge transport server.
D.
Edge transport server.
Answers
Suggested answer: C

Your company is planning to use an uninterruptible power supply (UPS) to avoid damage from power fluctuations. As a network administrator, you need to suggest an appropriate UPS solution suitable for specific resources or conditions. Match the type of UPS with the use and advantage:

A.
1-i,2-iv,3-ii,4-v
A.
1-i,2-iv,3-ii,4-v
Answers
B.
1-v,2-iii,3-i,4-ii
B.
1-v,2-iii,3-i,4-ii
Answers
C.
1-ii,2-iv,3-iii,4-i
C.
1-ii,2-iv,3-iii,4-i
Answers
D.
1-iii,2-iv,3-v,4-iv
D.
1-iii,2-iv,3-v,4-iv
Answers
Suggested answer: C

John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________.

A.
Mitigation, Security policies
A.
Mitigation, Security policies
Answers
B.
Verification, Security Policies
B.
Verification, Security Policies
Answers
C.
Vulnerability scanning, Risk Analysis
C.
Vulnerability scanning, Risk Analysis
Answers
D.
Risk analysis, Risk matrix
D.
Risk analysis, Risk matrix
Answers
Suggested answer: D

Which filter to locate unusual ICMP request an Analyst can use in order to detect a ICMP probes from the attacker to a target OS looking for the response to perform ICMP based fingerprinting?

A.
(icmp.type==9 && ((!(icmp.code==9))
A.
(icmp.type==9 && ((!(icmp.code==9))
Answers
B.
(icmp.type==8 && ((!(icmp.code==8))
B.
(icmp.type==8 && ((!(icmp.code==8))
Answers
C.
(icmp.type==12) | | (icmp.type==15| |(icmp.type==17)
C.
(icmp.type==12) | | (icmp.type==15| |(icmp.type==17)
Answers
D.
(icmp.type==14) | | (icmp.type==15| |(icmp.type==17)
D.
(icmp.type==14) | | (icmp.type==15| |(icmp.type==17)
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62