Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is a problem connecting to the main server. How will you prioritize these two incidents?
A. Based on a first come first served basis
B. Based on the type of response needed for the incident
C. Based on a potential technical effect of the incident
D. Based on approval from management
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?
A. Hub-and-Spoke
B. Full Mesh
C. Point-to-Point
D. Star
Which of the following is a best practice for wireless network security?
A. Do not placing packet filter between the AP and the corporate intranet
B. Using SSID cloaking
C. Do not changing the default SSID
D. Enabling the remote router login
According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication. What needs to happen to force this server to use Windows Authentication?
A. Edit the ADLIN file.
B. Remove the /var/bin/localauth.conf file.
C. Edit the PAM file to enforce Windows Authentication.
D. Edit the shadow file.
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?
A. Pipe model
B. Hose model
C. AAA model
D. Hub-and-Spoke VPN model
Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?
A. They function on the data link layer.
B. They work on the network layer.
C. They function on either the application or the physical layer.
D. They work on the session layer.
Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium? (Choose all that apply.)
A. Reliability
B. Capability
C. Accountability
D. Extensibility
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?
A. Packet Filtering
B. Circuit level gateway
C. Application level gateway
D. Stateful Multilayer Inspection
Which of the following attack signature analysis techniques are implemented to examine the header information and conclude that a packet has been altered?
A. Composite signature-based analysis
B. Atomic signature-based analysis
C. Content-based signature analysis
D. Context-based signature analysis
Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement and be network-wide. What type of solution would be best for Lyle?
A. He should choose a HIPS solution, as this is best suited to his needs.
B. Lyle would be best suited if he chose a NIPS implementation.
C. A NEPT implementation would be the best choice.
D. To better serve the security needs of his company, Lyle should use a HIDS system.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.