Pass4itsure > EC-COUNCIL > Certified Ethical Hacker > 312-38 > 312-38 Online Practice Questions and Answers

312-38 Online Practice Questions and Answers

Questions 4

Which of the following is used in conjunction with smoke detectors and fire alarm systems to improve and increase public safety?

A. Gaseous fire suppression

B. Gaseous emission system

C. Fire sprinkler

D. Fire suppression system

Buy Now
Questions 5

Which of the following is a method of authentication that uses physical characteristics?

A. COMSEC

B. ACL

C. Honeypot

D. Biometrics

Buy Now
Questions 6

Which of the following protocols is used for E-mail?

A. TELNET

B. MIME

C. SSH

D. SMTP

Buy Now
Questions 7

Which of the following is a network analysis tool that sends packets with nontraditional IP stack parameters?

A. Nessus

B. COPS

C. SAINT

D. HPing

Buy Now
Questions 8

Which of the following is a communication protocol multicasts messages and information of all the member IP multicast group?

A. IGMP

B. ICMP

C. BGP

D. None

E. EGP

Buy Now
Questions 9

You just set up a wireless network to customers in the cafe. Which of the following are good security measures implemented? Each correct answer represents a complete solution. Choose all that apply.

A. WEP encryption

B. WPA encryption

C. Not broadcasting the SSID

D. The MAC-filtering router

Buy Now
Questions 10

Which of the following offer "always-on" Internet service for connecting to your ISP? Each correct answer represents a complete solution. Choose all that apply.

A. analog modem

B. digital modem

C. DSL

D. cable modem

Buy Now
Questions 11

Which of the following is a management process that provides a framework for promoting quick recovery and the capability for an effective response to protect the interests of its brand, reputation, and stakeholders?

A. Log analysis

B. Incident handling

C. Business Continuity Management

D. Patch management

Buy Now
Questions 12

John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is called a __________ and it has to adhere to the __________.

A. Mitigation, Security policies

B. Verification, Security Policies

C. Vulnerability scanning, Risk Analysis

D. Risk analysis, Risk matrix

Buy Now
Questions 13

Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.

A. It uses a longer subnet masks as those used for IPv4.

B. The interoperability, the IPv4 addresses using the last 32 bits of the IPv6 address.

C. It provides enhanced authentication and security.

D. It uses 128-bit addresses.

E. It's more of available IP addresses.

Buy Now
Exam Code: 312-38
Exam Name: Certified Network Defender (CND)
Last Update: Nov 25, 2024
Questions: 653
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99