ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 31

Add to Whishlist

List of questions

Question 301

Report Export Collapse

Which of the following is one of the most commonly used implementations of RAID?

Become a Premium Member for full access
  Unlock Premium Member

Question 302

Report Export Collapse

Which of the following types of RAID offers no protection for the parity disk?

Become a Premium Member for full access
  Unlock Premium Member

Question 303

Report Export Collapse

Which of the following processes helps the business units to understand the impact of a disruptive event?

Become a Premium Member for full access
  Unlock Premium Member

Question 304

Report Export Collapse

Which of the following is a network analysis tool that sends packets with nontraditional IP stack parameters?

Become a Premium Member for full access
  Unlock Premium Member

Question 305

Report Export Collapse

Which of the following protocols is a method of implementing virtual private networks?

Become a Premium Member for full access
  Unlock Premium Member

Question 306

Report Export Collapse

Adam works as a Professional Penetration Tester. A project has been assigned to him to test the vulnerabilities of the CISCO Router of Umbrella Inc. Adam finds out that HTTP Configuration Arbitrary Administrative Access Vulnerability exists in the router. By applying different password cracking tools, Adam gains access to the router. He analyzes the router config file and notices the following lines:

logging buffered errors logging history critical logging trap warnings logging 10.0.1.103

By analyzing the above lines, Adam concludes that this router is logging at log level 4 to the syslog server 10.0.1.103. He decides to change the log level from 4 to 0. Which of the following is the most likely reason of changing the log level?

Become a Premium Member for full access
  Unlock Premium Member

Question 307

Report Export Collapse

Which of the following protocols permits users to enter a user-friendly computer name into the Windows browser and to map network drives and view shared folders?

Become a Premium Member for full access
  Unlock Premium Member

Question 308

Report Export Collapse

Which of the following attacks are computer threats that try to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 309

Report Export Collapse

Which of the following is the best way of protecting important data against virus attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 310

Report Export Collapse

Which of the following is a service discovery protocol that allows computers and other devices to find services in a local area network without prior configuration?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70

Related questions