ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this? Each correct answer represents a part of the solution. (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member

Question 162

Report Export Collapse

Which of the following steps are required in an idle scan of a closed port?

Each correct answer represents a part of the solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 163

Report Export Collapse

Which of the following statements are true about security risks? Each correct answer represents a complete solution. (Choose three.)

Become a Premium Member for full access
  Unlock Premium Member

Question 164

Report Export Collapse

Which of the following statements are TRUE about Demilitarized zone (DMZ)? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 165

Report Export Collapse

Which of the following is a management process that provides a framework for promoting quick recovery and the capability for an effective response to protect the interests of its brand, reputation, and stakeholders?

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse

Jason works as a System Administrator for www.company.com Inc. The company has a Windows-based network. Sam, an employee of the company, accidentally changes some of the applications and system settings. He complains to Jason that his system is not working properly. To troubleshoot the problem, Jason diagnoses the internals of his computer and observes that some changes have been made in Sam's computer registry. To rectify the issue, Jason has to restore the registry. Which of the following utilities can Jason use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

Which of the following are the valid steps for securing routers? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

In which of the following attacks does an attacker successfully insert an intermediary software or program between two communicating hosts?

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

Which of the following is a standard-based protocol that provides the highest level of VPN security?

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

Which of the following is a computer networking protocol used by hosts to retrieve IP address assignments and other configuration information?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions