Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

312-38 CND
Real Dumps
https://www.certspots.com/exam/312-38/
EC-Council 312-38 CND Real Dumps
1. Rick has implemented several firewalls and IDS systems across his 
enterprise network.
What should he do to effectively correlate all incidents that pass 
through these security controls?
A. Use firewalls in Network Address Transition (NAT) mode
B. Implement IPsec
C. Implement Simple Network Management Protocol (SNMP)
D. Use Network Time Protocol (NTP)
Answer: D
EC-Council 312-38 CND Real Dumps
2. John has successfully remediated the vulnerability of an internal 
application that could have caused a threat to the network. He is 
scanning the application for the existence of a remediated 
vulnerability, this process is called a________and it has to adhere to 
the_________
A. Verification, Security Policies
B. Mitigation, Security policies
C. Vulnerability scanning, Risk Analysis
D. Risk analysis, Risk matrix
Answer: A
EC-Council 312-38 CND Real Dumps
3. Who is responsible for executing the policies and plans required 
for supporting the information technology and computer systems of 
an organization?
A. Senior management
B. IT security practitioners
C. Business and functional managers
D. Chief Information Officer (CIO)
Answer: D
EC-Council 312-38 CND Real Dumps
4. What is the best way to describe a mesh network topology?
A. A network the is extremely cost efficient, offering the best option 
for allowing computers to communicate amongst each other.
B. A network in which every computer in the network can 
communicate with a single central computer.
C. A network in which every computer in the network has a 
connection to each and every computer in the network.
D. A network in which every computer meshes together to form a 
hybrid between a star and bus topology.
Answer: C
EC-Council 312-38 CND Real Dumps
5. What is the correct order of activities that a IDS is supposed to 
attempt in order to detect an intrusion?
A. Prevention, Intrusion Monitoring, Intrusion Detection, Response
B. Intrusion Monitoring, Intrusion Detection, Response, Prevention
C. Intrusion Detection, Response, Prevention, Intrusion Monitoring
D. Prevention, Intrusion Detection, Response, Intrusion Monitoring
Answer: B
EC-Council 312-38 CND Real Dumps
6. Which of the following intrusion detection techniques observes the 
network for abnormal usage patterns by determining the 
performance parameters for regular activities and monitoring for 
actions beyond the normal parameters?
A. Signature/Pattern matching
B. Stateful protocol analysis
C. None of these
D. Statistical anomaly detection
Answer: D
EC-Council 312-38 CND Real Dumps
7. HexCom, a leading IT Company in the USA, realized that their 
employees were having trouble accessing multiple servers with 
different passwords. Due to this, the centralized server was also 
being overburdened by avoidable network traffic.
To overcome the issue, what type of authentication can be given to 
the employees?
A. Two-Factor Authentication
B. Biometric Authentication
C. Single Sign-on (SSO)
D. Smart Card Authentication
Answer: C
EC-Council 312-38 CND Real Dumps
8. Which wireless networking topology setup requires same channel 
name and SSID?
A. Ad-Hoc standalone network architecture
B. Infrastructure network topology
C. Hybrid topology
D. Mesh topology
Answer: B
EC-Council 312-38 CND Real Dumps
9. Which type of training can create awareness among employees 
regarding compliance issues?
A. Social engineering awareness training
B. Security policy training
C. Physical security awareness training
D. Training on data classification
Answer: B
EC-Council 312-38 CND Real Dumps
10. Which type of information security policy addresses the 
implementation and configuration of technology and user behavior?
A. Enterprise information security policy
B. Acceptable use policy
C. System specific security policy
D. Issue-specific security policy
Answer: C