Questions for the 312-38 were updated on : Oct 04 ,2024
Management decides to implement a risk management system to reduce and maintain the
organization's risk at an acceptable level. Which of the following is the correct order in the risk
management phase?
A
John has implemented________in the network to restrict the limit of public IP addresses in his
organization and to enhance the firewall filtering technique.
D
What command is used to terminate certain processes in an Ubuntu system?
C
Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1
and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any
one
of
the
main
nodes fail?
C
Stephanie is currently setting up email security so all company data is secured when passed through
email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next,
she
needs
to
ensure that the incoming and the outgoing mail has not been modified or altered using digital
signatures. What is Stephanie working on?
C
An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO
wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to
do this job?
A
Eric is receiving complaints from employees that their systems are very slow and experiencing odd
issues including restarting automatically and frequent system hangs. Upon investigating, he is
convinced
the
systems
are infected with a virus that forces systems to shut down automatically after period of time. What
type of security incident are the employees a victim of?
B
-----------is a group of broadband wireless communications standards for Metropolitan Area Networks
(MANs)
D
The network admin decides to assign a class B IP address to a host in the network. Identify which of
the following addresses fall within a class B IP address range.
C
Rick has implemented several firewalls and IDS systems across his enterprise network. What should
he do to effectively correlate all incidents that pass through these security controls?
D
Management asked their network administrator to suggest an appropriate backup medium for their
backup plan that best suits their organization's need. Which of the following factors will the
administrator
consider
when
deciding on the appropriate backup medium?
A, C, D
Which of the following network monitoring techniques requires extra monitoring software or
hardware?
A
Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP
address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He
also
wants
IP
addresses to be private addresses, to prevent public Internet devices direct access to them. What
should Steven implement on the firewall to ensure this happens?
D
What is the name of the authority that verifies the certificate authority in digital certificates?
D
Will is working as a Network Administrator. Management wants to maintain a backup of all the
company data as soon as it starts operations. They decided to use a RAID backup storage technology
for
their
data
backup
plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data
written to one disk is copied automatically to the other disk as well. This maintains an additional
copy of the dat
a.
Which RAID level is used here?
B