Free 312-38 Exam Braindumps (page: 21)

Page 20 of 155

Network security is the specialist area, which consists of the provisions and policies adopted by the Network Administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. For which of the following reasons is network security needed? Each correct answer represents a complete solution. Choose all that apply.

  1. To protect information from loss and deliver it to its destination properly
  2. To protect information from unwanted editing, accidentally or intentionally by unauthorized users
  3. To protect private information on the Internet
  4. To prevent a user from sending a message to another user with the name of a third person

Answer(s): A,B,C,D

Explanation:

Network security is needed for the following reasons: To protect private information on the Internet
To protect information from unwanted editing, accidentally or intentionally by unauthorized users To protect information from loss and deliver it to its destination properly
To prevent a user from sending a message to another user with the name of a third person



Which of the following policies helps in defining what users can and should do to use network and organization's computer equipment?

  1. General policy
  2. Remote access policy
  3. IT policy
  4. User policy

Answer(s): D

Explanation:

A user policy helps in defining what users can and should do to use network and organization's computer equipment. It also defines what limitations are put on users for maintaining the network secure such as whether users can install programs on their workstations, types of programs users are using, and how users can access data.
Answer option C is incorrect. IT policy includes general policies for the IT department. These policies are intended to keep the network secure and stable. It includes the following:
Virus incident and security incident Backup policy
Client update policies
Server configuration, patch update, and modification policies (security) Firewall policies Dmz policy, email retention, and auto forwarded email policy
Answer option A is incorrect. It defines the high level program policy and business continuity plan. Answer option B is incorrect. Remote access policy is a document that outlines and defines acceptable methods of remotely connecting to the internal network.



FILL BLANK
Fill in the blank with the appropriate term. In computing, ________________is a class of data storage devices that read their data in sequence.

  1. SAM

Answer(s): A

Explanation:

In computing, sequential access memory (SAM) is a class of data storage devices that read their data in sequence. This is in contrast to random access memory (RAM) where data can be accessed in any order. Sequential access devices are usually a form of magnetic memory. While sequential access memory is read in sequence, access can still be made to arbitrary locations by "seeking" to the requested location. Magnetic sequential access memory is typically used for secondary storage in general-purpose computers due to their higher density at lower cost compared to RAM, as well as resistance to wear and non-volatility. Examples of SAM devices include hard disks, CD-ROMs, and magnetic tapes.



Which of the following are the responsibilities of the disaster recovery team? Each correct answer represents a complete solution. Choose all that apply.

  1. To monitor the execution of the disaster recovery plan and assess the results
  2. To modify and update the disaster recovery plan according to the lessons learned from previous disaster recovery efforts
  3. To notify management, affected personnel, and third parties about the disaster
  4. To initiate the execution of the disaster recovery procedures

Answer(s): A,B,C,D

Explanation:

The responsibilities of the disaster recovery team are as follows: To develop, deploy, and monitor the implementation of appropriate disaster recovery plans after analysis of business objectives and threats to organizations.
To notify management, affected personnel, and third parties about the disaster To initiate the execution of the disaster recovery procedures.
To monitor the execution of the disaster recovery plan and assess the results To return operations to normal conditions.
To modify and update the disaster recovery plan according to the lessons learned from previous disaster recovery efforts.
To increase the level of the organization's disaster recovery preparedness by conducting mock drills, regular DR systems testing, and threat analysis to create awareness among various stakeholders of the organization by conducting training and awareness sessions.






Post your Comments and Discuss EC-Council 312-38 exam with other Community members:

312-38 Discussions & Posts