Leads4pass > EC-COUNCIL > EC-COUNCIL Certifications > 312-38 > 312-38 Online Practice Questions and Answers

312-38 Online Practice Questions and Answers

Questions 4

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

A. Disaster Recovery Plan

B. Business Continuity Plan

C. Contingency Plan

D. Continuity of Operations Plan

Buy Now
Questions 5

Which of the following is a mechanism that helps to ensure that only the intended and authorized recipients are able to read the data?

A. access to information

B. none

C. integrity

D. authentication

E. confidence

Buy Now
Questions 6

Which of the following layers of the TCP/IP model maintains data integrity by ensuring that messages are delivered in the order in which they are sent and that there is no loss or duplication?

A. Transport layer

B. Link layer

C. Internet layer

D. Application layer

Buy Now
Questions 7

Which of the following classes of IP addresses provides a maximum of only 254 host addresses per network ID?

A. Class D

B. Class B

C. Class C

D. Class A

Buy Now
Questions 8

Which of the following is a presentation layer protocol?

A. TCP

B. RPC

C. BGP

D. LWAPP

Buy Now
Questions 9

Kyle is an IT technician managing 25 workstations and 4 servers. The servers run applications and mostly store confidential data. Kyle must backup the server's data daily to ensure nothing is lost. The power in the company's office is not always reliable, Kyle needs to make sure the servers do not go down or are without power for too long. Kyle decides to purchase an Uninterruptible Power Supply (UPS) that has a pair of inverters and converters to charge the battery and provides power when needed. What type of UPS has Kyle purchased?

A. Kyle purchased a Ferro resonant Standby UPS.

B. Kyle purchased a Line-Interactive UPS

C. He has bought a Standby UPS

D. He purchased a True Online UPS.

Buy Now
Questions 10

Identity the method involved in purging technique of data destruction.

A. Incineration

B. Overwriting

C. Degaussing

D. Wiping

Buy Now
Questions 11

Who is responsible for executing the policies and plans required for supporting the information technology and computer systems of an organization?

A. Senior management

B. IT security practitioners

C. Business and functional managers

D. Chief Information Officer (CIO)

Buy Now
Questions 12

Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted publisher. Which of the following script execution policy setting this?

A. AllSigned

B. Restricted

C. RemoteSigned

D. Unrestricted

Buy Now
Questions 13

Fill in the blank with the appropriate term. In computing, is a class of data storage devices that read their data in sequence.

Buy Now
Exam Code: 312-38
Exam Name: EC-Council Certified Network Defender (CND)
Last Update: Jan 13, 2025
Questions: 653
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99