Implementing access control mechanisms, such as a firewall, to protect the network is an example of which of the following network defense approach?
A. Proactive approach
B. Retrospective approach
C. Preventive approach
D. Reactive approach
Which type of antenna is based on the principle of a satellite dish and can pick up Wi-Fi signals from a distance of ten miles of more?
A. Yagi antenna
B. Directional antenna
C. Omnidirectional antenna
D. Parabolic Grid antenna
Which scan attempt can penetrate through a router and a firewall that filter incoming packets with particular flags set and is not supported by Windows?
A. ARP scan attempt
B. TCP full connect scan attempt
C. TCP null scan attempt
D. PINC sweep attempt
Which type of training can create awareness among employees regarding compliance issues?
A. Social engineering awareness training
B. Security policy training
C. Physical security awareness training
D. Training on data classification
Identify the minimum number of drives required to setup RAID level 5.
A. Multiple
B. 3
C. 4
D. 2
Which of the following filters can be used to detect UDP scan attempts using Wireshark?
A. icmp.type==3 and icmp.code==3
B. icmp.type==13
C. icmp.type==8 or icmp.type==0
D. icmp.type==15
Rosa is working as a network defender at Linda Systems. Recently, the company migrated from Windows to MacOS. Rosa wants to view the security related logs of her system, where con she find these logs?
A. /private/var/log
B. /var/log/cups/access-log
C. /Library/Logs/Sync
D. /Library/Logs
Which of the following characteristics represents a normal TCP packet?
A. SYN and FIN bits are set
B. Source or destination port b zero
C. FIN ACK and ACK are used in terminating the connection
D. The destination address is a broadcast address
Who offers formal experienced testimony in court?
A. Incident analyzer
B. Evidence documenter
C. Expert witness
D. Attorney
Which among the following is used to limit the number of cmdlets or administrative privileges of administrator, user, or service accounts?
A. Just Enough Administration (EA)
B. User Account Control (UAC)
C. Windows Security Identifier (SID)
D. Credential Guard
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.