Free 312-38 Exam Braindumps

Pass your EC-Council Network Security Administrator (ENSA) exam with these free Questions and Answers

Page 6 of 36
QUESTION 21

Malone is finishing up his incident handling plan for IT before giving it to his boss for review. He is outlining the incident response methodology and the steps that are involved. Which step should Malone list as the last step in the incident response methodology?

  1. A. Malone should list a follow-up as the last step in the methodology
  2. B. Recovery would be the correct choice for the last step in the incident response methodology
  3. C. He should assign eradication to the last step.
  4. D. Containment should be listed on Malone's plan for incident response.

Correct Answer: B

QUESTION 22

A company has the right to monitor the activities of their employees on different information systems according to the _______ policy.

  1. A. Information system
  2. B. User access control
  3. C. Internet usage
  4. D. Confidential data

Correct Answer: B

QUESTION 23

Identify the correct statements regarding a DMZ zone:

  1. A. It is a file integrity monitoring mechanism
  2. B. It is a Neutral zone between a trusted network and an untrusted network
  3. C. It serves as a proxy
  4. D. It includes sensitive internal servers such as database servers

Correct Answer: B

QUESTION 24

Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?

  1. A. Steven should use a Demilitarized Zone (DMZ)
  2. B. Steven should use Open Shortest Path First (OSPF)
  3. C. Steven should use IPsec
  4. D. Steven should enabled Network Address Translation(NAT)

Correct Answer: D

QUESTION 25

Paul is a network security technician working on a contract for a laptop manufacturing company in Chicago. He has focused primarily on securing network devices, firewalls, and traffic traversing in and out of the network. He just finished setting up a server a gateway between the internal private network and the outside public network. This server will act as a proxy, limited amount of services, and will filter packets. What is this type of server called?

  1. A. Bastion host
  2. B. Edge transport server
  3. C. SOCKS hsot
  4. D. Session layer firewall

Correct Answer: A

Page 6 of 36

Post your Comments and Discuss EC-Council 312-38 exam with other Community members: