Download ECCouncil.312-38.VCEplus.2024-10-12.195q.tqb

Download Exam

File Info

Exam Certified Network Defender
Number 312-38
File Name ECCouncil.312-38.VCEplus.2024-10-12.195q.tqb
Size 2 MB
Posted Oct 12, 2024
Download ECCouncil.312-38.VCEplus.2024-10-12.195q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which of the following layers of the OSI model provides physical addressing?


  1. Application layer
  2. Network layer
  3. Physical layer
  4. Data link layer
Correct answer: D



Question 2

Which of the following protocols is described as a connection-oriented and reliable delivery transport layer protocol?


  1. UDP
  2. IP
  3. SSL
  4. TCP
Correct answer: D



Question 3

Which of the following protocols is used for inter-domain multicast routing?


  1. BGP
  2. RPC
  3. VoIP
  4. RADIUS
Correct answer: A



Question 4

How many layers are present in the OSI layer model?


  1. 5
  2. 4
  3. 7
  4. 9
Correct answer: C



Question 5

Which of the following is an electronic device that helps in forwarding data packets along networks?


  1. Router
  2. Hub
  3. Repeater
  4. Gateway
Correct answer: A



Question 6

Which of the following protocols sends a jam signal when a collision is detected?


  1. ALOHA
  2. CSMA/CA
  3. CSMA/CD
  4. CSMA
Correct answer: C



Question 7

Which of the following key features limits the rate a sender transfers data to guarantee reliable delivery?


  1. Ordered data transfer
  2. Error-free data transfer
  3. Flow control
  4. Congestion control
Correct answer: C



Question 8

Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response.
Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?


  1. Extreme severity level
  2. Low severity level
  3. High severity level
  4. Mid severity level
Correct answer: B



Question 9

An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both detect and stop malicious traffic?


  1. passive mode
  2. inline mode
  3. promiscuous mode
  4. firewall mode
Correct answer: B



Question 10

Which protocol could choose the network administrator for the wireless network design, if he need to satisfied the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data rate and use DSSS for modulation.


  1. 802.11n
  2. 802.11g
  3. 802.11b
  4. 802.11a
Correct answer: C









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files