0% found this document useful (0 votes)
251 views7 pages

Exam Questions 312-38: EC-Council Network Security Administrator (ENSA)

The document provides sample questions and answers for the 312-38 EC-Council Network Security Administrator (ENSA) exam. It includes 41 multiple choice questions covering topics like network security, risk assessment, firewalls, VPNs, and the OSI model.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
251 views7 pages

Exam Questions 312-38: EC-Council Network Security Administrator (ENSA)

The document provides sample questions and answers for the 312-38 EC-Council Network Security Administrator (ENSA) exam. It includes 41 multiple choice questions covering topics like network security, risk assessment, firewalls, VPNs, and the OSI model.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Welcome to download the Newest 2passeasy 312-38 dumps

https://www.2passeasy.com/dumps/312-38/ (177 New Questions)

Exam Questions 312-38


EC-Council Network Security Administrator (ENSA)

https://www.2passeasy.com/dumps/312-38/

Passing Certification Exams Made Easy visit - https://www.2PassEasy.com


Welcome to download the Newest 2passeasy 312-38 dumps
https://www.2passeasy.com/dumps/312-38/ (177 New Questions)

NEW QUESTION 1
Identify the correct statements regarding a DMZ zone:

A. It is a file integrity monitoring mechanism


B. It is a Neutral zone between a trusted network and an untrusted network
C. It serves as a proxy
D. It includes sensitive internal servers such as database servers

Answer: B

NEW QUESTION 2
Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New
England and the headquarters in Boston where Fred works.
The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators.
Because of this, Fred's supervisor wants to implement
tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed
on all computers throughout the company and
monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of
solution does Fred's boss want to implement?

A. Fred's boss wants a NIDS implementation.


B. Fred's boss wants Fred to monitor a NIPS system.
C. Fred's boss wants to implement a HIPS solution.
D. Fred's boss wants to implement a HIDS solution.

Answer: D

NEW QUESTION 3
Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a
_______ as it seperates the storage units from the servers and the user network.

A. SAN
B. SCSA
C. NAS
D. SAS

Answer: A

NEW QUESTION 4
A local bank wants to protect their card holder data. The bank should comply with the ________ standard to ensure the security of card holder data.

A. HIPAA
B. ISEC
C. PCI DSS
D. SOAX

Answer: C

NEW QUESTION 5
Kyle, a front office executive, suspects that a Trojan has infected his computer. What should be his first course of action to deal with the incident?

A. Contain the damage


B. Disconnect the five infected devices from the network
C. Inform the IRT about the incident and wait for their response
D. Inform everybody in the organization about the attack

Answer: C

NEW QUESTION 6
Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor.
Certain parameters are required before calculating risk factor. What are they? (Select all that apply) Risk factor =.............X...............X...........

A. Vulnerability
B. Impact
C. Attack
D. Threat

Answer: ABD

NEW QUESTION 7
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors
24 hours. What is the best option to do this job?

A. Install a CCTV with cameras pointing to the entrance doors and the street
B. Use fences in the entrance doors

Passing Certification Exams Made Easy visit - https://www.2PassEasy.com


Welcome to download the Newest 2passeasy 312-38 dumps
https://www.2passeasy.com/dumps/312-38/ (177 New Questions)

C. Use lights in all the entrance doors and along the company's perimeter
D. Use an IDS in the entrance doors and install some of them near the corners

Answer: A

NEW QUESTION 8
Mark is monitoring the network traffic on his organization's network. He wants to detect a TCP and UDP ping sweep on his network. Which type of filter will be
used to detect this on the network?

A. Tcp.srcport==7 and udp.srcport==7


B. Tcp.srcport==7 and udp.dstport==7
C. Tcp.dstport==7 and udp.srcport==7
D. Tcp.dstport==7 and udp.dstport==7

Answer: D

NEW QUESTION 9
Henry needs to design a backup strategy for the organization with no service level downtime. Which backup method will he select?

A. Normal backup
B. Warm backup
C. Hot backup
D. Cold backup

Answer: C

NEW QUESTION 10
Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a
specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures.
What is Stephanie working on?

A. Confidentiality
B. Availability
C. Data Integrity
D. Usability

Answer: C

NEW QUESTION 10
Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices,
firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public
network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?

A. Bastion host
B. Edge transport server
C. SOCKS hsot
D. Session layer firewall

Answer: A

NEW QUESTION 14
What command is used to terminate certain processes in an Ubuntu system?

A. #grep Kill [Target Process}


B. #kill-9[PID]
C. #ps ax Kill
D. # netstat Kill [Target Process]

Answer: C

NEW QUESTION 16
David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals
of the company. David suggests the ________ framework, as it provides a set of controls over IT and consolidates them to form a framework.

A. RMIS
B. ITIL
C. ISO 27007
D. COBIT

Answer: D

NEW QUESTION 20
During a security awareness program, management was explaining the various reasons which create threats to network security. Which could be a possible threat
to network security?

Passing Certification Exams Made Easy visit - https://www.2PassEasy.com


Welcome to download the Newest 2passeasy 312-38 dumps
https://www.2passeasy.com/dumps/312-38/ (177 New Questions)

A. Configuring automatic OS updates


B. Having a web server in the internal network
C. Implementing VPN
D. Patch management

Answer: B

NEW QUESTION 24
A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other f unction(s) of the device? (Select all that apply)

A. Provides access memory, achieving high efficiency


B. Assigns user addresses
C. Enables input/output (I/O) operations
D. Manages security keys

Answer: BCD

NEW QUESTION 29
Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response.
Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

A. Extreme severity level


B. Low severity level
C. Mid severity level
D. High severity level

Answer: B

NEW QUESTION 30
Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

A. Pipe Model
B. AAA model
C. Hub-and-Spoke VPN model
D. Hose mode

Answer: A

NEW QUESTION 33
Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other
team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss
how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?

A. Their first step is to analyze the data they have currently gathered from the company or interviews.
B. Their first step is to make a hypothesis of what their final findings will be.
C. Their first step is to create an initial Executive report to show the management team.
D. Their first step is the acquisition of required documents, reviewing of security policies and compliance.

Answer: D

NEW QUESTION 38
Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more
employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of
college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking,
troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work
on. What should the new employees answer?

A. NICs work on the Session layer of the OSI model.


B. The new employees should say that NICs perform on the Network layer.
C. They should tell Bryson that NICs perform on the Physical layer
D. They should answer with the Presentation layer.

Answer: C

NEW QUESTION 41
Kyle is an IT consultant working on a contract for a large energy company in Houston. Kyle was hired on to do contract work three weeks ago so the company
could prepare for an external IT security audit. With suggestions from upper management, Kyle has installed a network-based IDS system. This system checks for
abnormal behavior and patterns found in network traffic that appear to be dissimilar from the traffic normally recorded by the IDS. What type of detection is this
network-based IDS system using?

A. This network-based IDS system is using anomaly detection.


B. This network-based IDS system is using dissimilarity algorithms.
C. This system is using misuse detection.
D. This network-based IDS is utilizing definition-based detection.

Answer: A

Passing Certification Exams Made Easy visit - https://www.2PassEasy.com


Welcome to download the Newest 2passeasy 312-38 dumps
https://www.2passeasy.com/dumps/312-38/ (177 New Questions)

NEW QUESTION 43
Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?

A. Mitigation
B. Assessment
C. Remediation
D. Verification

Answer: C

NEW QUESTION 45
If a network is at risk from unskilled individuals, what type of threat is this?

A. External Threats
B. Structured Threats
C. Unstructured Threats
D. Internal Threats

Answer: C

NEW QUESTION 46
Identify the minimum number of drives required to setup RAID level 5.

A. Multiple
B. 3
C. 4
D. 2

Answer: B

NEW QUESTION 50
Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the
correct order in the risk management phase?

A. Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review
B. Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk Assessment
C. Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk Identification
D. Risk Identificatio
E. Risk Assessmen
F. Risk Monitoring & Review, Risk Treatment

Answer: A

NEW QUESTION 55
A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a _______ identified which
helps measure how risky an activity is.

A. Risk Severity
B. Risk Matrix
C. Key Risk Indicator
D. Risk levels

Answer: C

NEW QUESTION 58
Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with
each other to determine the correlation across one or multiple fields?

A. Automated Field Correlation


B. Field-Based Approach

Passing Certification Exams Made Easy visit - https://www.2PassEasy.com


Welcome to download the Newest 2passeasy 312-38 dumps
https://www.2passeasy.com/dumps/312-38/ (177 New Questions)

C. Rule-Based Approach
D. Graph-Based Approach

Answer: A

NEW QUESTION 59
Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network
or the Internet?

A. Star
B. Point-to-Point
C. Full Mesh
D. Hub-and-Spoke

Answer: D

NEW QUESTION 62
Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He
recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network
nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about
preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy
to implement and be network-wide. What type of solution would be best for Lyle?

A. A NEPT implementation would be the best choice.


B. To better serve the security needs of his company, Lyle should use a HIDS system.
C. Lyle would be best suited if he chose a NIPS implementation
D. He should choose a HIPS solution, as this is best suited to his needs.

Answer: C

NEW QUESTION 65
John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network
information. Which type of firewall service is John thinking of implementing?

A. Application level gateway


B. Stateful Multilayer Inspection
C. Circuit level gateway
D. Packet Filtering

Answer: C

NEW QUESTION 67
You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region. You
suspect a DoS incident on the network. What will be your first reaction as a first responder?

A. Avoid Fear, Uncertainty and Doubt


B. Communicate the incident
C. Make an initial assessment
D. Disable Virus Protection

Answer: A

NEW QUESTION 72
Which of the following is a best practice for wireless network security?

A. Enabling the remote router login


B. Do not changing the default SSID
C. Do not placing packet filter between the AP and the corporate intranet
D. Using SSID cloaking

Answer: D

NEW QUESTION 75
An organization needs to adhere to the ________ rules for safeguarding and protecting the electronically stored health information of employees.

A. HI PA A
B. PCI DSS
C. ISEC
D. SOX

Answer: A

NEW QUESTION 80
......

Passing Certification Exams Made Easy visit - https://www.2PassEasy.com


Welcome to download the Newest 2passeasy 312-38 dumps
https://www.2passeasy.com/dumps/312-38/ (177 New Questions)

THANKS FOR TRYING THE DEMO OF OUR PRODUCT

Visit Our Site to Purchase the Full Set of Actual 312-38 Exam Questions With Answers.

We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the
312-38 Product From:

https://www.2passeasy.com/dumps/312-38/

Money Back Guarantee

312-38 Practice Exam Features:

* 312-38 Questions and Answers Updated Frequently

* 312-38 Practice Questions Verified by Expert Senior Certified Staff

* 312-38 Most Realistic Questions that Guarantee you a Pass on Your FirstTry

* 312-38 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year

Passing Certification Exams Made Easy visit - https://www.2PassEasy.com


Powered by TCPDF (www.tcpdf.org)

You might also like