Alex is administering the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?
A. netstat -a
B. netstat -ao
C. netstat -o
D. netstat -an
Which type of wireless network attack is characterized by an attacker using a high gain amplifier from a nearby location to drown out the legitimate access point signal?
A. Rogue access point attack
B. Ad Hoc Connection attack
C. Jamming signal attack
D. Unauthorized association
Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?
A. Striping
B. None of these
C. Parity
D. Mirroring
Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?
A. Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring and Review
B. Risk Identification, Risk Assessment, Risk Monitoring and Review, Risk Treatment
C. Risk Treatment, Risk Monitoring and Review, Risk Identification, Risk Assessment
D. Risk Assessment, Risk Treatment, Risk Monitoring and Review, Risk Identification
You want to increase your network security implementing a technology that only allows certain MAC addresses in specific ports in the switches; which one of the above is the best choice?
A. Port Security
B. Port Authorization
C. Port Detection
D. Port Knocking
Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?
A. Extreme severity level
B. Low severity level
C. High severity level
D. Mid severity level
An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both detect and stop malicious traffic?
A. passive mode
B. inline mode
C. promiscuous mode
D. firewall mode
Which protocol could choose the network administrator for the wireless network design, if he need to satisfied the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data rate and use DSSS for modulation.
A. 802.11n
B. 802.11g
C. 802.11b
D. 802.11a
Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and warning signs.
A. Technical control
B. Environmental control
C. Physical control
D. Administrative control
Which Internet access policy starts with all services blocked and the administrator enables safe and necessary services individually, which provides maximum security and logs everything, such as system and network activities?
A. Internet access policy
B. Paranoid policy
C. Permissive policy
D. Prudent policy
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.