Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-38 Practice Exam with Questions & Answers

Questions 1

How does Windows’ in-built security component, AppLocker, whitelist applications?

Options:
A.

Using Path Rule

B.

Using Signature Rule

C.

Using Certificate Rule

D.

Using Internet Zone Rule

ECCouncil 312-38 Premium Access
Questions 2

Which of the following refers to a potential occurrence of an undesired event that can eventually damage and interrupt the operational and functional activities of an organization?

Options:
A.

Attack

B.

Risk

C.

Threat

D.

Vulnerability

Questions 3

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's _________integrity check mechanism provides security against a replay attack

Options:
A.

CRC-32

B.

CRC-MAC

C.

CBC-MAC

D.

CBC-32

Questions 4

How is application whitelisting different from application blacklisting?

Options:
A.

It allows all applications other than the undesirable applications

B.

It allows execution of trusted applications in a unified environment

C.

It allows execution of untrusted applications in an isolated environment

D.

It rejects all applications other than the allowed applications

Questions 5

Which antenna's characteristic refer to the calculation of radiated in a particular direction. It is generally the ratio of radiation intensity in a given direction to the average radiation intensity?

Options:
A.

Radiation pattern

B.

Polarization

C.

Directivity

D.

Typical gain

Questions 6

Daniel who works as a network administrator has just deployed an in his organizations network. He wants to calculate the False Positive rate for his implementation. Which of the following formulas will he use to calculate the False Positive rate?

Options:
A.

False Positive/False Positive+True Negative

B.

True Negative/False Negative+True Positive

C.

False Negative/False Negative+True Positive

D.

False Negative/True Negative+True Positive

Questions 7

Which of the following Wireshark filters can a network administrator use to view the packets without any flags set in order to detect TCP Null Scan attempts?

Options:
A.

TCP.flags==0x000

B.

tcp.flags==0X029

C.

tcp.flags==0x003

D.

tcp.dstport==7

Questions 8

Michael decides to view the-----------------to track employee actions on the organization's network.

Options:
A.

Firewall policy

B.

Firewall log

C.

Firewall settings

D.

Firewall rule set

Questions 9

Which protocol would the network administrator choose for the wireless network design. If he

needs to satisfy the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data

rate and use DSSS for modulation.

Options:
A.

802.11a

B.

802.11g

C.

802.11b

D.

802.11n

Questions 10

Which of the following examines Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) for a disaster recovery strategy?

Options:
A.

Risk Assessment

B.

Risk Management

C.

Business Continuity Plan

D.

Business Impact Analysis