Download EC-Council Network Security Administrator.PracticeTest.312-38.2020-04-17.1e.187q.vcex


Download Exam

File Info

Exam EC-Council Network Security Administrator
Number 312-38
File Name EC-Council Network Security Administrator.PracticeTest.312-38.2020-04-17.1e.187q.vcex
Size 1.14 Mb
Posted April 17, 2020
Downloads 1



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
John works as a C programmer. He develops the following C program:

  

His program is vulnerable to a __________ attack.

  • A: SQL injection 
  • B: Denial-of-Service
  • C: Buffer overflow
  • D: Cross site scripting



Question 2
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.

  • A: The router does not have a configuration file.
  • B: There is a need to set operating parameters.
  • C: The user interrupts the boot sequence.
  • D: The router does not find a valid operating system image.



Question 3
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?

  • A: Sequence Number
  • B: Header Length
  • C: Acknowledgment Number 
  • D: Source Port Address



Question 4
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
„It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.“ 
Which of the following tools is John using to crack the wireless encryption keys?

  • A: PsPasswd
  • B: Kismet
  • C: AirSnort
  • D: Cain



Question 5
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?

  • A: IPS
  • B: HIDS
  • C: DMZ
  • D: NIDS



Question 6
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?

  • A: PPTP VPN
  • B: Remote access VPN
  • C: Extranet-based VPN
  • D: Intranet-based VPN



Question 7
Which of the following is a protocol that describes an approach to providing "streamlined" support of OSI application services on top of TCP/IP-based networks for some constrained environments?

  • A: Network News Transfer Protocol 
  • B: Lightweight Presentation Protocol
  • C: Internet Relay Chat Protocol
  • D: Dynamic Host Configuration Protocol



Question 8
You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?

  • A: Implement a strong password policy.
  • B: Implement a strong firewall.
  • C: Implement a honeypot.
  • D: Implement network based antivirus.



Question 9
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?

  • A: Nmap
  • B: Hping
  • C: NetRanger
  • D: PSAD



Question 10
Which of the following is a distributed application architecture that partitions tasks or workloads between service providers and service requesters? Each correct answer represents a complete solution. Choose all that apply.

  • A: Client-server computing 
  • B: Peer-to-peer (P2P) computing
  • C: Client-server networking
  • D: Peer-to-peer networking









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset