Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. Which step should Malone list as the last step in the incident response methodology?
A. Malone should list a follow-up as the last step in the methodology
B. Recovery would be the correct choice for the last step in the incident response methodology
C. He should assign eradication to the last step.
D. Containment should be listed on Malone's plan for incident response.
James wants to implement certain control measures to prevent denial-of-service attacks against the organization. Which of the following control measures can help James?
A. Strong passwords
B. Reduce the sessions time-out duration for the connection attempts
C. A honeypot in DMZ
D. Provide network-based anti-virus
During a security awareness program, management was explaining the various reasons which create threats to network security. Which could be a possible threat to network security?
A. Configuring automatic OS updates
B. Having a web server in the internal network
C. Implementing VPN
D. Patch management
Which OSI layer does a Network Interface Card (NIC) work on?
A. Physical layer
B. Presentation layer
C. Network layer
D. Session layer
Which of the following network monitoring techniques requires extra monitoring software or hardware?
A. Non-router based
B. Switch based
C. Hub based
D. Router based
An organization needs to adhere to the______________rules for safeguarding and protecting the electronically stored health information of employees.
A. HI PA A
B. PCI DSS
C. ISEC
D. SOX
Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any one of the main nodes fail?
A. Failure of the main node affects all other child nodes at the same level irrespective of the main node.
B. Does not cause any disturbance to the child nodes or its tranmission
C. Failure of the main node will affect all related child nodes connected to the main node
D. Affects the root node only
If a network is at risk from unskilled individuals, what type of threat is this?
A. External Threats
B. Structured Threats
C. Unstructured Threats
D. Internal Threats
Rick has implemented several firewalls and IDS systems across his enterprise network. What should he do to effectively correlate all incidents that pass through these security controls?
A. Use firewalls in Network Address Transition (NAT) mode
B. Implement IPsec
C. Implement Simple Network Management Protocol (SNMP)
D. Use Network Time Protocol (NTP)
Brendan wants to implement a hardware based RAID system in his network. He is thinking of choosing a suitable RAM type for the architectural setup in the system. The type he is interested in provides access times of up to 20 ns. Which type of RAM will he select for his RAID system?
A. NVRAM
B. SDRAM
C. NAND flash memory
D. SRAM
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.