Pass the ECCouncil CND 312-38 Questions and answers with CertsForce

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

Frank is a network technician working for a medium-sized law firm in Memphis. Frank and two other IT employees take care of all the technical needs for the firm. The firm's partners have asked that a secure wireless

network be implemented in the office so employees can move about freely without being tied to a network cable. While Frank and his colleagues are familiar with wired Ethernet technologies, 802.3, they are not familiar

with how to setup wireless in a business environment. What IEEE standard should Frank and the other IT employees follow to become familiar with wireless?

Options:

A.

The IEEE standard covering wireless is 802.9 and they should follow this.


B.

802.7 covers wireless standards and should be followed


C.

They should follow the 802.11 standard


D.

Frank and the other IT employees should follow the 802.1 standard.


Expert Solution
Questions # 92:

Which of the following Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or

multiple fields?

Options:

A.

Automated Field Correlation


B.

Field-Based Approach


C.

Rule-Based Approach


D.

Graph-Based Approach


Expert Solution
Questions # 93:

Which wireless networking topology setup requires same channel name and SSID?

Options:

A.

Ad-Hoc standalone network architecture


B.

Infrastructure network topology


C.

Hybrid topology


D.

Mesh topology


Expert Solution
Questions # 94:

Which authentication technique involves mathematical pattern-recognition of the colored part of the eye behind the cornea?

Options:

A.

Iris Scanning


B.

Retinal Scanning


C.

Facial Recognition


D.

Vein Scanning


Expert Solution
Questions # 95:

------------is a group of broadband wireless communications standards for Metropolitan Area Networks (MANs)

Options:

A.

802.15


B.

802.16


C.

802.15.4


D.

802.12


Expert Solution
Questions # 96:

The--------------protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

Options:

A.

RARP


B.

ICMP


C.

DHCP


D.

ARP


Expert Solution
Questions # 97:

Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP

addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?

Options:

A.

Steven should use a Demilitarized Zone (DMZ)


B.

Steven should use Open Shortest Path First (OSPF)


C.

Steven should use IPsec


D.

Steven should enabled Network Address Translation(NAT)


Expert Solution
Questions # 98:

Which of the following provides enhanced password protection, secured loT connections, and encompasses stronger encryption techniques?

Options:

A.

WPA3


B.

WEP


C.

WPA


D.

WPA2


Expert Solution
Questions # 99:

Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?

Options:

A.

ESP


B.

AH


C.

IKE


D.

ISAKMP


Expert Solution
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions