Text Material Preview
312-38 CND Real Dumps https://www.certspots.com/exam/312-38/ EC-Council 312-38 CND Real Dumps 1. Rick has implemented several firewalls and IDS systems across his enterprise network. What should he do to effectively correlate all incidents that pass through these security controls? A. Use firewalls in Network Address Transition (NAT) mode B. Implement IPsec C. Implement Simple Network Management Protocol (SNMP) D. Use Network Time Protocol (NTP) Answer: D EC-Council 312-38 CND Real Dumps 2. John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a________and it has to adhere to the_________ A. Verification, Security Policies B. Mitigation, Security policies C. Vulnerability scanning, Risk Analysis D. Risk analysis, Risk matrix Answer: A EC-Council 312-38 CND Real Dumps 3. Who is responsible for executing the policies and plans required for supporting the information technology and computer systems of an organization? A. Senior management B. IT security practitioners C. Business and functional managers D. Chief Information Officer (CIO) Answer: D EC-Council 312-38 CND Real Dumps 4. What is the best way to describe a mesh network topology? A. A network the is extremely cost efficient, offering the best option for allowing computers to communicate amongst each other. B. A network in which every computer in the network can communicate with a single central computer. C. A network in which every computer in the network has a connection to each and every computer in the network. D. A network in which every computer meshes together to form a hybrid between a star and bus topology. Answer: C EC-Council 312-38 CND Real Dumps 5. What is the correct order of activities that a IDS is supposed to attempt in order to detect an intrusion? A. Prevention, Intrusion Monitoring, Intrusion Detection, Response B. Intrusion Monitoring, Intrusion Detection, Response, Prevention C. Intrusion Detection, Response, Prevention, Intrusion Monitoring D. Prevention, Intrusion Detection, Response, Intrusion Monitoring Answer: B EC-Council 312-38 CND Real Dumps 6. Which of the following intrusion detection techniques observes the network for abnormal usage patterns by determining the performance parameters for regular activities and monitoring for actions beyond the normal parameters? A. Signature/Pattern matching B. Stateful protocol analysis C. None of these D. Statistical anomaly detection Answer: D EC-Council 312-38 CND Real Dumps 7. HexCom, a leading IT Company in the USA, realized that their employees were having trouble accessing multiple servers with different passwords. Due to this, the centralized server was also being overburdened by avoidable network traffic. To overcome the issue, what type of authentication can be given to the employees? A. Two-Factor Authentication B. Biometric Authentication C. Single Sign-on (SSO) D. Smart Card Authentication Answer: C EC-Council 312-38 CND Real Dumps 8. Which wireless networking topology setup requires same channel name and SSID? A. Ad-Hoc standalone network architecture B. Infrastructure network topology C. Hybrid topology D. Mesh topology Answer: B EC-Council 312-38 CND Real Dumps 9. Which type of training can create awareness among employees regarding compliance issues? A. Social engineering awareness training B. Security policy training C. Physical security awareness training D. Training on data classification Answer: B EC-Council 312-38 CND Real Dumps 10. Which type of information security policy addresses the implementation and configuration of technology and user behavior? A. Enterprise information security policy B. Acceptable use policy C. System specific security policy D. Issue-specific security policy Answer: C