Which of the following statements are TRUE about Demilitarized zone (DMZ)? Each correct answer represents a complete solution. Choose all that apply.
A. The purpose of a DMZ is to add an additional layer of security to the Local Area Network of an organization.
B. Hosts in the DMZ have full connectivity to specific hosts in the internal network.
C. Demilitarized zone is a physical or logical sub-network that contains and exposes external services of an organization to a larger un-trusted network.
D. In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.
Which of the following statements are true about security risks? Each correct answer represents a complete solution. (Choose three.)
A. They are considered an indicator of threats coupled with vulnerability.
B. They can be removed completely by taking proper actions.
C. They can be analyzed and measured by the risk analysis process.
D. They can be mitigated by reviewing and taking responsible actions based on possible risks.
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
A. PSAD
B. Hping
C. NetRanger
D. Nmap
Which of the following is a management process that provides a framework for promoting quick recovery and the capability for an effective response to protect the interests of its brand, reputation, and stakeholders?
A. Log analysis
B. Patch management
C. Incident handling
D. Business Continuity Management
Jason works as a System Administrator for www.company.com Inc. The company has a Windows-based network. Sam, an employee of the company, accidentally changes some of the applications and system settings. He complains to Jason that his system is not working properly. To troubleshoot the problem, Jason diagnoses the internals of his computer and observes that some changes have been made in Sam's computer registry. To rectify the issue, Jason has to restore the registry. Which of the following utilities can Jason use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. Resplendent registrar
B. Regedit.exe
C. Reg.exe
D. EventCombMT
In which of the following attacks does an attacker successfully insert an intermediary software or program between two communicating hosts?
A. Session hijacking
B. Denial-of-Service
C. Man-in-the-middle
D. Buffer overflow
Which of the following are the valid steps for securing routers? Each correct answer represents a complete solution. Choose all that apply.
A. Use a password that is easy to remember for a router's administrative console.
B. Use a complex password for a router's administrative console.
C. Configure access list entries to prevent unauthorized connections and traffic routing.
D. Keep routers updated with the latest security patches.
Which of the following is a computer networking protocol used by hosts to retrieve IP address assignments and other configuration information?
A. SNMP
B. ARP
C. DHCP
D. Telnet
Which of the following is a standard-based protocol that provides the highest level of VPN security?
A. IPSec
B. IP
C. PPP
D. L2TP
Which of the following is a maintenance protocol that permits routers and host computers to swap basic control information when data is sent from one computer to another?
A. IGMP
B. ICMP
C. SNMP
D. BGP
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.