Michael decides to view the ________ to track employee actions on the organization's network.
A. Firewall policy
B. Firewall settings
C. Firewall log
D. Firewall rule set
Which of the following acts as a verifier for the certificate authority?
A. Registration authority
B. Certificate authority
C. Directory management system
D. Certificate Management system
What is the best way to describe a mesh network topology?
A. A network in which every computer in the network has a connection to each and every computer in the network.
B. A network in which every computer meshes together to form a hybrid between a star and bus topology.
C. A network in which every computer in the network can communicate with a single central computer.
D. A network that is extremely cost efficient, offering the best option for allowing computers to communicate amongst each other.
You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site hosted. Which vulnerability assessment tool should you consider to use?
A. dnsbrute
B. hping
C. OpenVAS
D. wireshark
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?
A. Verification
B. Mitigation
C. Remediation
D. Assessment
Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:
1.
It has a parity check to store all the information about the data in multiple drives
2.
Help reconstruct the data during downtime.
3.
Process the data at a good speed.
4.
Should not be expensive.
The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?
A. RAID 3.
B. RAID 1
C. RAID 0
D. RAID 10
A network designer needs to submit a proposal for a company, which has just published a web portal for its clients on the internet. Such a server needs to be isolated from the internal network, placing itself in a DMZ. Faced with this need, the designer will present a proposal for a firewall with three interfaces, one for the internet network, another for the DMZ server farm and another for the internal network. What kind of topology will the designer propose?
A. Screened subnet
B. Multi-homed firewall
C. Bastion host
D. DMZ, External-Internal firewall
Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?
A. Incident Response Policy (IRP)
B. Issue Specific Security Policy (ISSP)
C. Enterprise Information Security Policy (EISP)
D. System Specific Security Policy (SSSP)
During the recovery process, RTO and RPO should be the main parameters of your disaster recovery plan. What does RPO refer to?
A. The encryption feature, acting as add-on security to the data
B. The hot plugging technique used to replace computer components
C. The duration required to restore the data
D. The interval after which the data quality is lost
Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?
A. High interaction honeypots
B. Research honeypot
C. Low interaction honeypots
D. Pure honeypots
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.