This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Thu Nov 21 14:41:54 2024 / +0000 GMT ___________________________________________________ Title: [December-2021]312-38 Dumps 312-38 648Q Instant Download in Braindump2go[Q600-Q637] --------------------------------------------------- December/2021 Latest Braindump2go 312-38 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 312-38 Real Exam Questions!QUESTION 600Which BC/DR activity works on the assumption that the most critical processes are brought back from a remote location first, followed by the less critical functions?A. RecoveryB. RestorationC. ResponseD. ResumptionAnswer: AQUESTION 601Richard has been working as a Linux system administrator at an MNC. He wants to maintain a productive and secure environment by improving the performance of the systems through Linux patch management. Richard is using Ubuntu and wants to patch the Linux systems manually. Which among the following command installs updates (new ones) for Debian-based Linux OSes?A. sudo apt-get upgradeB. sudo apt-get dist-updateC. sudo apt-get dist-upgradeD. sudo apt-get updateAnswer: CQUESTION 602Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?A. Southbound APIB. Eastbound APIC. Westbound APID. Northbound APIAnswer: AQUESTION 603Henry, head of network security at Gentech, has discovered a general report template that someone has reserved only for the CEO. Since the file has to be editable, viewable, and deletable by everyone, what permission value should he set?A. 700B. 777C. 755D. 600Answer: BQUESTION 604Which of the following provides a set of voluntary recommended cyber security features to include in network-capable IoT devices?A. FGMAB. GLBAC. GCMAD. NISTAnswer: DQUESTION 605Which type of wireless network threats an attacker stakes out the area from a nearby location with a high gain amplifier drowning out the legitimate access point?A. Rogue access point attackB. Jamming signal attackC. Ad Hoc Connection attackD. Unauthorized associationAnswer: BQUESTION 606Which of the following type of UPS is used to supply power above 10kVA and provides an ideal electric output presentation, and its constant wear on the power components reduces the dependability?A. Line InteractiveB. Double conversion on-lineC. Stand by FerroD. Stand by On-line hybridAnswer: BQUESTION 607John has planned to update all Linux workstations in his network. The organization is using various Linux distributions including Red hat, Fedora and Debian. Which of following commands will he use to update each respective Linux distribution? A. 1-ii, 2-i,3-iv,4-iiiB. 1-v,2-iii,3-i,4-ivC. 1-iv,2-v,3-iv,4-iiiD. 1-iii,2-iv,3-ii,4-vAnswer: AQUESTION 608Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?A. IKEB. ESPC. AHD. ISAKMPAnswer: BQUESTION 609Which characteristic of an antenna refers to how directional an antennas radiation pattern is?A. Radiation patternB. PolarizationC. DirectivityD. Typical gainAnswer: AQUESTION 610Which field is not included in the TCP header?A. Acknowledgment numberB. Sequence numberC. Source portD. Source IP addressAnswer: DQUESTION 611A network designer needs to submit a proposal for a company, which has just published a web portal for its clients on the internet. Such a server needs to be isolated from the internal network, placing itself in a DMZ. Faced with this need, the designer will present a proposal for a firewall with three interfaces, one for the internet network, another for the DMZ server farm and another for the internal network. What kind of topology will the designer propose?A. Screened subnetB. Multi-homed firewallC. Bastion hostD. DMZ, External-Internal firewallAnswer: BQUESTION 612You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site hosted. Which vulnerability assessment tool should you consider to use?A. dnsbruteB. hpingC. OpenVASD. wiresharkAnswer: CQUESTION 613What is the best way to describe a mesh network topology?A. A network in which every computer in the network has a connection to each and every computer in the network.B. A network in which every computer meshes together to form a hybrid between a star and bus topology.C. A network in which every computer in the network can communicate with a single central computer.D. A network that is extremely cost efficient, offering the best option for allowing computers to communicate amongst each other.Answer: AQUESTION 614The security network team is trying to implement a firewall capable of operating only in the session layer, monitoring the TCP inter-packet link protocol to determine when a requested session is legitimate or not. Using this type of firewall, they could be able to intercept the communication, making the external network see that the firewall is the source, and facing the user, who responds from the outside is the firewall itself. They are just limiting a requirements previous listed, because they already have a packet filtering firewall and they must add a cheap solution that meets the objective. What kind of firewall would you recommend?A. Packet Filtering with NATB. Circuit Level Gateway C. Application ProxiesD. Application Level GatewaysAnswer: BQUESTION 615If a network is at risk resulting from misconfiguration performed by unskilled and/or unqualified individuals, what type of threat is this?A. External ThreatsB. Unstructured ThreatsC. Structured ThreatsD. Internal ThreatsAnswer: BQUESTION 616John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt? (Choose all that apply.)A. tcp.flags=0x00B. tcp.options.wscale_val==20C. tcp.flags==0x2bD. tcp.options.mss_val<1460Answer: ACDQUESTION 617Michael decides to view the ________ to track employee actions on the organization's network.A. Firewall policyB. Firewall settingsC. Firewall logD. Firewall rule setAnswer: CQUESTION 618Which of the following systems includes an independent NAS Head and multiple storage arrays?A. FreeNASB. None of theseC. Gateway NAS SystemD. Integrated NAS SystemAnswer: CQUESTION 619Which of the following can be used to suppress fire from Class K sources?A. WaterB. Carbon dioxideC. FoamD. Dry ChemicalAnswer: CQUESTION 620Match the following NIST security life cycle components with their activities: A. 1-iv, 2- iii,3-v,4-iB. 1-ii,2-i,3-v,4-ivC. 1-i,2-v,3-iii,4-iiD. 1-iii,2-iv,3-v,4-iAnswer: AQUESTION 621What is the correct order of activities that a IDS is supposed to attempt in order of detect an intrusion?A. Prevention, Intrusion Monitoring, intrusion Detection, ResponseB. Intrusion Detection, Response, Prevention, Intrusion MonitoringC. Intrusion Monitoring, Intrusion Detection, Response, PreventionD. Prevention, intrusion Detection, Response, Intrusion MonitoringAnswer: AQUESTION 622Larry is a network administrator working for a manufacturing company in Detroit. Larry is responsible for the entire company's network which consists of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to cut back on costs and bring the email control internal. Larry likes this idea because it will give him more control over email. Larry wants to purchase a server for email but he does not want the server to be on the internal network because this might cause security risks. He decides to place the email server on the outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect some traffic from accessing the email server; the server will essentially be place between the two firewalls. What logical area is Larry going to place the new email server into?A. He is going to place the server in a Demilitarized Zone (DMZ).B. He will put the email server in an IPSec zone.C. For security reasons, Larry is going to place the email server in the company's Logical Buffer Zone (LBZ).D. Larry is going to put the email server in a hot-server zone.Answer: AQUESTION 623Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures. What is Stephanie working on?A. UsabilityB. ConfidentialityC. AvailabilityD. Data IntegrityAnswer: DQUESTION 624Which of the following interfaces uses hot plugging technique to replace computer components without the need to shut down the system?A. SATAB. SCSIC. IDED. SDRAMAnswer: BQUESTION 625Alex is administering the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?A. netstat -aB. netstat -aoC. netstat -oD. netstat -anAnswer: DQUESTION 626Which type of wireless network attack is characterized by an attacker using a high gain amplifier from a nearby location to drown out the legitimate access point signal?A. Rogue access point attackB. Ad Hoc Connection attackC. Jamming signal attackD. Unauthorized associationAnswer: CQUESTION 627Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?A. StripingB. None of theseC. ParityD. MirroringAnswer: AQUESTION 628Management decides to implement a risk management system to reduce and maintain the organization's risk to an acceptable level. Which of the following is the correct order in the risk management phase?A. Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & ReviewB. Risk Identification, Risk Assessment, Risk Monitoring & Review, Risk TreatmentC. Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk AssessmentD. Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk IdentificationAnswer: AQUESTION 629You want to increase your network security implementing a technology that only allows certain MAC addresses in specific ports in the switches; which one of the above is the best choice?A. Port SecurityB. Port AuthorizationC. Port DetectionD. Port KnockingAnswer: AQUESTION 630An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both detect and stop malicious traffic?A. passive modeB. inline modeC. promiscuous modeD. firewall modeAnswer: BQUESTION 631Which protocol could choose the network administrator for the wireless network design, if he need to satisfied the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data rate and use DSSS for modulation.A. 802.11nB. 802.11gC. 802.11bD. 802.11aAnswer: CQUESTION 632Physical access controls help organizations monitor, record, and control access to the information assets and facility. Identify the category of physical security controls which includes security labels and warning signs.A. Technical controlB. Environmental controlC. Physical controlD. Administrative controlAnswer: DQUESTION 633Which Internet access policy starts with all services blocked and the administrator enables safe and necessary services individually, which provides maximum security and logs everything, such as system and network activities?A. Internet access policyB. Paranoid policyC. Permissive policyD. Prudent policyAnswer: DQUESTION 634Daniel who works as a network administrator has just deployed an IDS in his organization's network. He wants to calculate the False Positive rate for his implementation. Which of the following formulas will he use, to calculate the False Positive rate?A. False Negative/True Negative+True PositiveB. False Positive/False Positive+True NegativeC. True Negative/False Negative+True PositiveD. False Negative/False Negative+True PositiveAnswer: BQUESTION 635The SNMP contains various commands that reduce the burden on the network administrators. Which of the following commands is used by SNMP agents to notify SNMP managers about an event occurring in the network?A. INFORMB. RESPONSEC. TRAPSD. SETAnswer: CQUESTION 636Your company is planning to use an uninterruptible power supply (UPS) to avoid damage from power fluctuations. As a network administrator, you need to suggest an appropriate UPS solution suitable for specific resources or conditions. Match the type of UPS with the use and advantage: A. 1-i,2-iv,3-ii,4-vB. 1-v,2-iii,3-i,4-iiC. 1-ii,2-iv,3-iii,4-iD. 1-iii,2-iv,3-v,4-ivAnswer: CQUESTION 637Which filter to locate unusual ICMP request an Analyst can use in order to detect a ICMP probes from the attacker to a target OS looking for the response to perform ICMP based fingerprinting?A. (icmp.type==9 && ((!(icmp.code==9))B. (icmp.type==8 && ((!(icmp.code==8))C. (icmp.type==12) | | (icmp.type==15| |(icmp.type==17)D. (icmp.type==14) | | (icmp.type==15| |(icmp.type==17)Answer: BResources From:1.2021 Latest Braindump2go 312-38 Exam Dumps (PDF & VCE) Free Share:https://www.braindump2go.com/312-38.html2.2021 Latest Braindump2go 312-38 PDF and 312-38 VCE Dumps Free Share:https://drive.google.com/drive/folders/1JHmt8zgt01GeFxvepYDX5qwyBE5QSDuc?usp=sharing3.2021 Free Braindump2go 312-38 Exam Questions Download:https://www.braindump2go.com/free-online-pdf/312-38-Exam-Dumps(611-637).pdfhttps://www.braindump2go.com/free-online-pdf/312-38-VCE-Dumps(583-610).pdfFree Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams! --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2021-12-08 08:15:00 Post date GMT: 2021-12-08 08:15:00 Post modified date: 2021-12-08 08:15:00 Post modified date GMT: 2021-12-08 08:15:00 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com