Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Mock Test Free

312-38 Mock Test Free

Table of Contents

Toggle
  • 312-38 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
  • Access Full 312-38 Mock Test Free

312-38 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.

Getting ready for your 312-38 certification exam? Start your preparation the smart way with our 312-38 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.

Using a mock test free for 312-38 exam is one of the best ways to:

  • Familiarize yourself with the actual exam format and question style
  • Identify areas where you need more review
  • Strengthen your time management and test-taking strategy

Below, you will find 50 free questions from our 312-38 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.

Question 1

Which of the following protocols is used for inter-domain multicast routing?

A. BGP

B. RPC

C. VoIP

D. RADIUS

 


Suggested Answer: A

 

Question 2

Which of the following steps OPSEC process examines every aspect of the proposed operation to identify the OPSEC indicators that can reveal important information and then compare them with indicators of the opponent's intelligence collection capabilities identified in the previous activity?

A. Identification of Critical Information

B. analysis weakness

C. risk assessment

D. Appropriate OPSEC measures

E. analysis of threats

 


Suggested Answer: E

Community Answer: E

 

Question 3

Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?

A. Hash rule

B. Path rule

C. Internet zone rule

D. Certificate rule

 


Suggested Answer: B

Community Answer: B

 

Question 4

A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a __________ identified which helps measure how risky an activity is.

A. Risk Severity

B. Risk Matrix

C. Risk levels

D. Key Risk Indicator

 


Suggested Answer: B

Community Answer: D

 

Question 5

Which of the following representatives of the incident response team takes forensic backups of systems that are the focus of an incident?

A. Technical representative

B. Lead investigator

C. Information security representative

D. Legal representative

 


Suggested Answer: A

A technical representative creates forensic backups of systems that are the focus of an incident and provides valuable information about the configuration of the network and target system.
Answer option B is incorrect. A lead investigator acts as the manager of the computer security incident response team.
Answer option D is incorrect. The legal representative looks after legal issues and ensures that the investigation process does not break any law.
Answer option C is incorrect. The information security representative informs about the security safeguards that may affect their ability to respond to the incident.

Question 6

Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KRI) to assess the organization. Why is Chris calculating the KRI for his organization? It helps Chris to:

A. Identifies adverse events

B. Facilitates backward viewing

C. Notifies when risk has reached threshold levels

D. Facilitates post incident management

 


Suggested Answer: C

Community Answer: A

 

Question 7

Which phase of incident response process involves collection of incident evidence and sending them to forensic department for further investigation?

A. Incident containment

B. Incident recording and assignment

C. Eradication

D. Preparation for incident response

 


Suggested Answer: D

Community Answer: A

 

Question 8

Which of the following statement holds true in terms of containers?

A. Container requires more memory space

B. Each container runs in its own OS

C. Container is fully isolated; hence, more secure

D. Process-level isolation happens; a container in hence less secure

 


Suggested Answer: C

Community Answer: C

 

Question 9

Which of the following is a term to describe the use of inert gases and chemical agents to extinguish a fire?

A. Gaseous fire suppression

B. Fire alarm system

C. Fire sprinkler

D. Fire suppression system

 


Suggested Answer: A

Community Answer: D

 

Question 10

John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?

A. Router IP route

B. Router(Config-if) # IP route cache flow

C. Router# Netmon enable

D. Router# netflow enable

 


Suggested Answer: B

Community Answer: B

 

Question 11

Which among the following is used by anti-malware systems and threat intelligence platforms to spot and stop malicious activities at an initial stage?

A. Indicators of attack

B. Key risk indicators

C. Indicators of compromise

D. Indicators of exposure

 


Suggested Answer: C

Community Answer: D

 

Question 12

Which of the following IEEE standards provides specifications for wireless ATM systems?

A. 802.1

B. 802.5

C. 802.3

D. 802.11a

 


Suggested Answer: D

 

Question 13

Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?

A. Southbound API

B. Eastbound API

C. Westbound API

D. Northbound API

 


Suggested Answer: A

Community Answer: A

 

Question 14

Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?

A. Steven should use Open Shortest Path First (OSPF).

B. Steven should enable Network Address Translation (NAT).

C. Steven should use a Demilitarized Zone (DMZ).

D. Steven should use IPsec.

 


Suggested Answer: B

Community Answer: B

 

Question 15

The Circuit-level gateway firewall technology functions at which of the following OSI layer?

A. Transport layer

B. Data-link layer

C. Session layer

D. Network layer

 


Suggested Answer: C

 

Question 16

Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?

A. ISO/IEC 27005

B. ISO/IEC 27006

C. ISO/IEC 27002

D. ISO/IEC 27004

 


Suggested Answer: A

Community Answer: A

 

Question 17

Which of the following intrusion detection techniques observes the network for abnormal usage patterns by determining the performance parameters for regular activities and monitoring for actions beyond the normal parameters?

A. Statistical anomaly detection

B. Signature/Pattern matching

C. None of these

D. Stateful protocol analysis

 


Suggested Answer: A

Community Answer: A

 

Question 18

Which of the following interfaces uses hot plugging technique to replace computer components without the need to shut down the system?

A. SATA

B. SCSI

C. IDE

D. SDRAM

 


Suggested Answer: A

Community Answer: A

 

Question 19

Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?

A. IKE

B. ESP

C. AH

D. ISAKMP

 


Suggested Answer: B

 

Question 20

Which type of modulation technique is used in local area wireless networks (LAWNs)?

A. FHSS

B. DSSS

C. MIMO-OFDM

D. OFDM

 


Suggested Answer: B

Community Answer: A

 

Question 21

Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of
IPs respond with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?

A. The type of scan she is using is called a NULL scan.

B. Cindy is attempting to find live hosts on her company’s network by using a XMAS scan.

C. Cindy is using a half-open scan to find live hosts on her network.

D. She is utilizing a RST scan to find live hosts that are listening on her network.

 


Suggested Answer: C

 

Question 22

Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?

A. Shared Responsibility Model for Container Services

B. Shared Responsibility Model for Infrastructure Services

C. Shared Responsibility Model for Abstract Services

D. Shared Responsibility Model for Storage Services

 


Suggested Answer: D

Community Answer: D

 

Question 23

Which of the following is not part of the recommended first response steps for network defenders?

A. Restrict yourself from doing the investigation

B. Extract relevant data from the suspected devices as early as possible

C. Disable virus protection

D. Do not change the state of the suspected device

 


Suggested Answer: B

Community Answer: B

 

Question 24

Michelle is a network security administrator working at a multinational company. She wants to provide secure access to corporate data (documents, spreadsheets, email, schedules, presentations, and other enterprise data) on mobile devices across organizations networks without being slowed down and also wants to enable easy and secure sharing of information between devices within an enterprise. Based on the above-mentioned requirements, which among the following solution should Michelle implement?

A. MDM

B. MAM

C. MCM

D. MEM

 


Suggested Answer: B

 

Question 25

Byron, a new network administrator at FBI, would like to ensure that Windows PCs there are up-to-date and have less internal security flaws. What can he do?

A. Centrally assign Windows PC group policies

B. Dedicate a partition on HDD and format the disk using NTFS

C. Download and install latest patches and enable Windows Automatic Updates

D. Install antivirus software and turn off unnecessary services

 


Suggested Answer: C

Community Answer: C

 

Question 26

Sam wants to implement a network-based IDS and finalizes an IDS solution that works based on pattern matching. Which type of network-based IDS is Sam implementing?

A. Behavior-based IDS

B. Anomaly-based IDS

C. Signature-based IDS

D. Stateful protocol analysis

 


Suggested Answer: B

Community Answer: B

 

Question 27

Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?

A. High interaction honeypots

B. Research honeypot

C. Low interaction honeypots

D. Pure honeypots

 


Suggested Answer: C

Community Answer: D

 

Question 28

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. (Choose two.)

A. Using WPA encryption

B. Not broadcasting SSID

C. Using WEP encryption

D. MAC filtering the router

 


Suggested Answer: CA

With either encryption method (WEP or WPA), you can give the password to the customers who need it, and even change it frequently (daily if you like). So this won’t be an inconvenience for the customers.

Question 29

Which protocol could choose the network administrator for the wireless network design, if he need to satisfied the minimum requirement of 2.4 GHz, 22 MHz of bandwidth, 2 Mbits/s stream for data rate and use DSSS for modulation.

A. 802.11n

B. 802.11g

C. 802.11b

D. 802.11a

 


Suggested Answer: C

Community Answer: C

 

Question 30

DRAG DROP -
Drag and drop the terms to match with their descriptions.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Following are the terms with their descriptions:
<img src=”https://www.examtopics.com/assets/media/exam-media/03651/0000400001.png” alt=”Reference Image” />
A Trojan horse is a malicious software program that contains hidden code and masquerades itself as a normal program. When a Trojan horse program is run, its hidden code runs to destroy or scramble data on the hard disk. An example of a Trojan horse is a program that masquerades as a computer logon to retrieve user names and password information. The developer of a Trojan horse can use this information later to gain unauthorized access to computers. Trojan horses are normally spread by e-mail attachments. Ping sweep is a technique used to determine which of a range of IP addresses map to live hosts. It consists of ICMP
ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. A ping is often used to check that a network device is functioning. To disable ping sweeps on a network, administrators can block ICMP ECHO requests from outside sources. However, ICMP TIMESTAMP and ICMP
INFO can be used in a similar manner. Spamware is software designed by or for spammers to send out automated spam e-mail. Spamware is used to search for e-mail addresses to build lists of e-mail addresses to be used either for spamming directly or to be sold to spammers. The spamware package also includes an e- mail harvesting tool. A backdoor is any program that allows a hacker to connect to a computer without going through the normal authentication process. The main advantage of this type of attack is that the network traffic moves from inside a network to the hacker’s computer. The traffic moving from inside a network to the outside world is typically the least restrictive, as companies are more concerned about what comes into a network, rather than what leaves it. It, therefore, becomes hard to detect backdoors.

Question 31

Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?

A. Mandatory access control

B. Non-discretionary access control

C. Discretionary access control

D. Role-based access control

 


Suggested Answer: C

Community Answer: C

 

Question 32

How is an “attack” represented?

A. Motive (goal) + method

B. Motive (goal) + method + vulnerability

C. Asset + Threat + Vulnerability

D. Asset + Threat

 


Suggested Answer: A

Community Answer: B

 

Question 33

Which of the following TCP/IP state transitions represents no connection state at all?

A. Closed

B. Closing

C. Close-wait

D. Fin-wait-1

 


Suggested Answer: A

 

Question 34

If an organization has decided to consume PaaS Cloud service model, then identify the organization's responsibility that they need to look after based on shared responsibility model.

A. Data, interfaces, application, etc.

B. Data, interfaces, application, middleware, OS, VM, virtual network, etc.

C. Data, interfaces, application, middleware, OS, VM, virtual network, hypervisors, processing and memory, data storage, network interfaces, facilities and data centers, etc.

D. Data, interfaces, etc.

 


Suggested Answer: A

Community Answer: A

 

Question 35

Which among the following tools can help in identifying IoEs to evaluate human attack surface?

A. securiCAD

B. Amass

C. Skybox

D. SET

 


Suggested Answer: D

Community Answer: D

 

Question 36

Which of the following is a centralized collection of honeypots and analysis tools?

A. Production honeypot

B. Honeynet

C. Research honeypot

D. Honeyfarm

 


Suggested Answer: D

Community Answer: D

 

Question 37

Which of the following is a process of transformation where the old system can no longer be maintained?

A. Disaster

B. Risk

C. Threat

D. Crisis

 


Suggested Answer: A

Community Answer: A

 

Question 38

Docker provides Platform-as-a-Service (PaaS) through ________ and delivers containerized software packages.

A. Server-level virtualization

B. Network-level virtualization

C. OS-level virtualization

D. Storage-level virtualization

 


Suggested Answer: C

Community Answer: C

 

Question 39

Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium? (Choose all that apply.)

A. Reliability

B. Capability

C. Accountability

D. Extensibility

 


Suggested Answer: ABD

Community Answer: ABD

 

Question 40

Which BC/DR activity works on the assumption that the most critical processes are brought back from a remote location first, followed by the less critical functions?

A. Recovery

B. Restoration

C. Response

D. Resumption

 


Suggested Answer: B

Community Answer: B

 

Question 41

Adam works as a Professional Penetration Tester. A project has been assigned to him to test the vulnerabilities of the CISCO Router of Umbrella Inc. Adam finds out that HTTP Configuration Arbitrary Administrative Access Vulnerability exists in the router. By applying different password cracking tools, Adam gains access to the router. He analyzes the router config file and notices the following lines: logging buffered errors logging history critical logging trap warnings logging 10.0.1.103
By analyzing the above lines, Adam concludes that this router is logging at log level 4 to the syslog server 10.0.1.103. He decides to change the log level from 4 to
0.
Which of the following is the most likely reason of changing the log level?

A. Changing the log level from 4 to 0 will result in the logging of only emergencies. This way the modification in the router is not sent to the syslog server.

B. By changing the log level, Adam can easily perform a SQL injection attack.

C. Changing the log level grants access to the router as an Administrator.

D. Changing the log level from 4 to 0 will result in the termination of logging. This way the modification in the router is not sent to the syslog server.

 


Suggested Answer: A

Community Answer: A

The Router Log Level directive is used by the sys log server to specify the level of severity of the log. This directive is used to control the types of errors that are sent to the error log by constraining the severity level. Eight different levels are present in the Log Level directive, which are shown below in order of their descending significance:
Number Level Description –
0emergEmergencies – system is unusable
1alertAction must be taken immediately
2critCritical Conditions
3errorError conditions
4warnWarning conditions
5notice Normal but significant condition
6infoInformational
7debug Debug-level messages
Note: When a certain level is specified, the messages from all other levels of higher significance will also be reported. For example, when Log Level crit is specified, then messages with log levels of alert and emerg will also be reported.

Question 42

Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?

A. Justine needs to install a biometrics station at each entrance.

B. She should install a mantrap.

C. She should install a Thompson Trapdoor.

D. Justine will need to install a revolving security door.

 


Suggested Answer: B

Community Answer: B

 

Question 43

Which of the following is a Cisco product that performs VPN and firewall functions?

A. Circuit-Level Gateway

B. PIX Firewall

C. IP Packet Filtering Firewall

D. Application Level Firewall

 


Suggested Answer: B

Community Answer: B

 

Question 44

Which of the following types of RAID offers no protection for the parity disk?

A. RAID 2

B. RAID 1

C. RAID 5

D. RAID 3

 


Suggested Answer: D

Community Answer: D

 

Question 45

Which of the following helps in viewing account activity and events for supported services made by AWS?

A. AWS CloudFormation

B. AWS Certificate Manager

C. AWS CloudHSM

D. AWS CloudTrial

 


Suggested Answer: D

 

Question 46

In ______ method, event logs are arranged in the form of a circular buffer.

A. Non-wrapping method

B. LIFO method

C. Wrapping method

D. FIFO method

 


Suggested Answer: C

Community Answer: C

 

Question 47

To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?

A. Prudent policy

B. Paranoid policy

C. Promiscuous policy

D. Permissive policy

 


Suggested Answer: A

 

Question 48

Which type of firewall consists of three interfaces and allows further subdivision of the systems based on specific security objectives of the organization?

A. Screened subnet

B. Bastion host

C. Unscreened subnet

D. Multi-homed firewall

 


Suggested Answer: D

Community Answer: A

 

Question 49

Which of the following layers provides communication session management between host computers?

A. Application layer

B. Internet layer

C. Transport layer

D. Link layer

 


Suggested Answer: C

 

Question 50

John works as a C programmer. He develops the following C program:
 Image
His program is vulnerable to a __________ attack.

A. SQL injection

B. Denial-of-Service

C. Buffer overflow

D. Cross site scripting

 


Suggested Answer: C

Community Answer: C

This program takes a user-supplied string and copies it into ‘buffer1’, which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

Access Full 312-38 Mock Test Free

Want a full-length mock test experience? Click here to unlock the complete 312-38 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.

We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!

Start practicing with our 312-38 mock test free today—and take a major step toward exam success!

Share18Tweet11
Previous Post

300-910 Mock Test Free

Next Post

312-39 Mock Test Free

Next Post

312-39 Mock Test Free

312-49 Mock Test Free

312-49V10 Mock Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.