Download EC-Council Network Security Administrator.PracticeTest.312-38.2020-04-17.1e.187q.vcex

Download Exam

File Info

Exam EC-Council Network Security Administrator
Number 312-38
File Name EC-Council Network Security Administrator.PracticeTest.312-38.2020-04-17.1e.187q.vcex
Size 1.14 Mb
Posted April 17, 2020
Downloads 1

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
John works as a C programmer. He develops the following C program:


His program is vulnerable to a __________ attack.

  • A: SQL injection 
  • B: Denial-of-Service
  • C: Buffer overflow
  • D: Cross site scripting

Question 2
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.

  • A: The router does not have a configuration file.
  • B: There is a need to set operating parameters.
  • C: The user interrupts the boot sequence.
  • D: The router does not find a valid operating system image.

Question 3
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?

  • A: Sequence Number
  • B: Header Length
  • C: Acknowledgment Number 
  • D: Source Port Address

Question 4
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
„It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.“ 
Which of the following tools is John using to crack the wireless encryption keys?

  • A: PsPasswd
  • B: Kismet
  • C: AirSnort
  • D: Cain

Question 5
Which of the following is an intrusion detection system that monitors and analyzes the internals of a computing system rather than the network packets on its external interfaces?

  • A: IPS
  • B: HIDS
  • C: DMZ
  • D: NIDS

Question 6
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?

  • B: Remote access VPN
  • C: Extranet-based VPN
  • D: Intranet-based VPN

Question 7
Which of the following is a protocol that describes an approach to providing "streamlined" support of OSI application services on top of TCP/IP-based networks for some constrained environments?

  • A: Network News Transfer Protocol 
  • B: Lightweight Presentation Protocol
  • C: Internet Relay Chat Protocol
  • D: Dynamic Host Configuration Protocol

Question 8
You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?

  • A: Implement a strong password policy.
  • B: Implement a strong firewall.
  • C: Implement a honeypot.
  • D: Implement network based antivirus.

Question 9
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?

  • A: Nmap
  • B: Hping
  • C: NetRanger
  • D: PSAD

Question 10
Which of the following is a distributed application architecture that partitions tasks or workloads between service providers and service requesters? Each correct answer represents a complete solution. Choose all that apply.

  • A: Client-server computing 
  • B: Peer-to-peer (P2P) computing
  • C: Client-server networking
  • D: Peer-to-peer networking



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files