ECCouncil 312-38 Practice Test - Questions Answers, Page 11
List of questions
Related questions
Which of the following are the common security problems involved in communications and email? Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the six different phases of the Incident handling process? Each correct answer represents a complete solution. Choose all that apply.
Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?
Which of the following is a network interconnectivity device that translates different communication protocols and is used to connect dissimilar network technologies?
Which of the following is a tool that runs on the Windows OS and analyzes iptables log messages to detect port scans and other suspicious traffic?
FILL BLANK
Fill in the blank with the appropriate term.
A ______________ is a physical or logical subnetwork that contains and exposes external services of an organization to a larger network.
Which of the following tools is a free laptop tracker that helps in tracking a user's laptop in case it gets stolen?
FILL BLANK
Fill in the blank with the appropriate term. ______________is a free open-source utility for network exploration and security auditing that is used to discover computers and services on a computer network, thus creating a "map" of the network.
FILL BLANK
Fill in the blank with the appropriate term. ______________is a powerful and low-interaction open source honeypot.
Which of the following statements are true about volatile memory? Each correct answer represents a complete solution. Choose all that apply.
Question