Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?
A. Southbound API
B. Eastbound API
C. Westbound API
D. Northbound API
Henry, head of network security at Gentech, has discovered a general report template that someone has reserved only for the CEO. Since the file has to be editable, viewable, and deletable by everyone, what permission value should he set?
A. 700
B. 777
C. 755
D. 600
Which of the following provides a set of voluntary recommended cyber security features to include in network-capable IoT devices?
A. FGMA
B. GLBA
C. GCMA
D. NIST
Which of the following is an example of MAC model?
A. Chinese Waterfall model
B. Clark-Beason integrity model
C. Access control matrix model
D. Bell-LaPadula model
How can a WAF validate traffic before it reaches a web application?
A. It uses a role-based filtering technique
B. It uses an access-based filtering technique
C. It uses a sandboxing filtering technique
D. It uses a rule-based filtering technique
Jason has set a firewall policy that allows only a specific list of network services and denies everything else. This strategy is known as a ____________.
A. Default allow
B. Default access
C. Default accept
D. Default deny
Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the _________ authentication technique to satisfy the request.
A. Single-sign-on
B. Smart card authentication
C. Two-factor authentication
D. Biometric
Which of the following things need to be identified during attack surface visualization?
A. Attacker's tools, techniques, and procedures
B. Authentication, authorization, and auditing in networks
C. Regulatory frameworks, standards and, procedures for organizations
D. Assets, topologies, and policies of the organization
John is a senior network security administrator working at a multinational company. He wants to block specific syscalls from being used by container binaries. Which Linux kernel feature restricts actions within the container?
A. Cgroups
B. LSMs
C. Seccomp
D. Userns
Which command is used to change the permissions of a file or directory?
A. rmdir
B. systemctl
C. kill
D. chmod
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.