ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











FILL BLANK

Fill in the blanks with the appropriate terms. In L2TP ______________ tunnel mode, the ISP must support L2TP, whereas in L2TP tunnel mode, the ISP does not need to support L2TP.

A.
compulsory
A.
compulsory
Answers
Suggested answer: A

Explanation:

The Layer 2 Tunnel Protocol is one of the tunneling protocols that is used in a virtual private network. It contains the functionality of Cisco's Layer 2 Forwarding (L2F) protocol and Microsoft's Point-to-Point Tunneling Protocol (PPTP). This protocol is vendor interoperable and supports multihopping. L2TP supports two tunnel modes: Compulsory tunnel:

In L2TP compulsory tunnel mode, a remote host initiates a connection to its Internet Service Provider (ISP). An L2TP connection is established between the remote user and the corporate network by the ISP. With a compulsory tunnel, the ISP must support L2TP.

Voluntary tunnel:

In L2TP voluntary tunnel mode, the connection is created by the remote user, typically by using an L2TP tunneling client. Then, the remote user sends L2TP packets to its ISP in order to forward them on to the corporate network. With a voluntary tunnel, the ISP does not need to support L2TP.

Jason works as a System Administrator for www.company.com Inc. The company has a Windows-based network. Sam, an employee of the company, accidentally changes some of the applications and system settings. He complains to Jason that his system is not working properly. To troubleshoot the problem, Jason diagnoses the internals of his computer and observes that some changes have been made in Sam's computer registry. To rectify the issue, Jason has to restore the registry. Which of the following utilities can Jason use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A.
Reg.exe
A.
Reg.exe
Answers
B.
EventCombMT
B.
EventCombMT
Answers
C.
Regedit.exe
C.
Regedit.exe
Answers
D.
Resplendent registrar
D.
Resplendent registrar
Answers
Suggested answer: A, C, D

Explanation:

The resplendent registrar is a tool that offers a complete and safe solution to administrators and power users for maintaining the registry. It can be used for maintaining the registry of desktops and remote computers on the network. It offers a solution for backing up and restoring registries, fast background search and replace, adding descriptions to the registry keys, etc. This program is very attractive and easy to use, as it comes in an explorer-style interface. It can be used for Windows 2003/XP/2K/NT/ME/9x.

Reg.exe is a command-line utility that is used to edit the Windows registry. It has the ability to import, export, back up, and restore keys, as well as to compare, modify, and delete keys. It can perform almost all tasks that can be done using the Windows-based Regedit.exe tool. Registry Editor (REGEDIT) is a registry editing utility that can be used to look at information in the registry. REGEDIT.EXE enables users to search for strings, values, keys, and subkeys and is useful to find a specific value or string. Users can also use REGEDIT.EXE to add, delete, or modify registry entries.

Answer option B is incorrect. EventCombMT is a multithreaded tool that is used to search the event logs of several different computers for specific events, all from one central location. It is a little-known Microsoft tool to run searches for event IDs or text strings against Windows event logs for systems, applications, and security, as well as File Replication Service (FRS), domain name system (DNS), and Active Directory (AD) logs where applicable. The MT stands for multithreaded. The program is part of the Account Lockout and Management Tools program package for Windows 2000, 2003, and XP.

Adam works as a Security Analyst for Umbrella Inc. The company has a Linux-based network comprising an Apache server for Web applications. He received the following Apache Web server log, which is as follows:

[Sat Nov 16 14:32:52 2009] [error] [client 128.0.0.7] client denied by server configuration: /export/home/htdocs/test

The first piece in the log entry is the date and time of the log message. The second entry determines the severity of the error being reported.

Now Adam wants to change the severity level to control the types of errors that are sent to the error log. Which of the following directives will Adam use to accomplish the task?

A.
CustomLog
A.
CustomLog
Answers
B.
ErrorLog
B.
ErrorLog
Answers
C.
LogFormat
C.
LogFormat
Answers
D.
LogLevel
D.
LogLevel
Answers
Suggested answer: D

Explanation:

The LogLevel directive is used in server Error log of the Apache Web server log. This directive is used to control the types of errors that are sent to the error log by constraining the severity level. Eight different levels are present in the LogLevel directive, which are shown below in order of their descending significance:

Note: When a certain level is specified, the messages from all other levels of higher significance will also be reported. For example, when LogLevel crit is specified, then messages with log levels of alert and emerg will also be reported.

Answer option B is incorrect. The ErrorLog directive is used to set the name and location of the file to which the server will log any errors it encounters. If the filepath does not begin with a slash sign (/), it is assumed to be relative to the ServerRoot. If the file-path begins with a pipe sign (|), then it is assumed to be a command that handles the error log.

Answer option A is incorrect. The CustomLog directive is used to log requests to the server. The format of the log is specified and the logging can be made conditional on request characteristics with the help of environment variables. Environment variables can be adjusted on a per-request basis with the help of the mod_setenvif or mod_rewrite module.

Answer option C is incorrect. The LogFormat directive can exist in one of the two forms. In the first form, only one argument is specified; and in the second form explicit format with a nickname is associated. This directive specifies the log format that is used by logs specified in subsequent TransferLog directives.

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

A.
Disaster Recovery Plan
A.
Disaster Recovery Plan
Answers
B.
Business Continuity Plan
B.
Business Continuity Plan
Answers
C.
Contingency Plan
C.
Contingency Plan
Answers
D.
Continuity of Operations Plan
D.
Continuity of Operations Plan
Answers
Suggested answer: B

Explanation:

BCP is a strategy to minimize the consequence of the instability and to allow for the continuation of business processes. The goal of BCP is to minimize the effects of a disruptive event on a company, and is formed to avoid interruptions to normal business activity. Business Continuity Planning (BCP) is the creation and validation of a practiced logistical plan for how an organization will recover and restore partially or completely interrupted critical (urgent) functions within a predetermined time after a disaster or extended disruption. The logistical plan is called a business continuity plan.

Answer option C is incorrect. A contingency plan is a plan devised for a specific situation when things could go wrong. Contingency plans are often devised by governments or businesses who want to be prepared for anything that could happen. Contingency plans include specific strategies and actions to deal with specific variances to assumptions resulting in a particular problem, emergency, or state of affairs. They also include a monitoring process and "triggers" for initiating planned actions. They are required to help governments, businesses, or individuals to recover from serious incidents in the minimum time with minimum cost and disruption.

Answer option A is incorrect. Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption of applications, data, hardware, communications (such as networking), and other IT infrastructure. A business continuity plan (BCP) includes planning for non-IT related aspects such as key personnel, facilities, crisis communication, and reputation protection, and should refer to the disaster recovery plan (DRP) for IT-related infrastructure recovery/continuity.

Answer option D is incorrect. The Continuity Of Operation Plan (COOP) refers to the preparations and institutions maintained by the United States government, providing survival of federal government operations in the case of catastrophic events. It provides procedures and capabilities to sustain an organization's essential. COOP is the procedure documented to ensure persistent critical operations throughout any period where normal operations are unattainable.

Which of the following standards is a change in the original IEEE 802.11 and defines the security mechanisms for wireless networks?

A.
802.11b
A.
802.11b
Answers
B.
802.11a
B.
802.11a
Answers
C.
None
C.
None
Answers
D.
802.11e
D.
802.11e
Answers
E.
802.11i
E.
802.11i
Answers
Suggested answer: E

Which of the following representatives of the incident response team takes the forensic backups of systems that are essential event?

A.
the legal representative
A.
the legal representative
Answers
B.
technical representative
B.
technical representative
Answers
C.
lead investigator
C.
lead investigator
Answers
D.
None
D.
None
Answers
E.
Information Security representative
E.
Information Security representative
Answers
Suggested answer: B

You work for a professional computer hacking forensic investigator DataEnet Inc. To explore the e-mail information about an employee of the company. The suspect an employee to use the online e-mail systems such as Hotmail or Yahoo. Which of the following folders on the local computer you are going to check to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

A.
cookies folder
A.
cookies folder
Answers
B.
Temporary Internet Folder
B.
Temporary Internet Folder
Answers
C.
download folder
C.
download folder
Answers
D.
History Folder
D.
History Folder
Answers
Suggested answer: A, B, D

Which of the following statements is not true about the FAT16 file system? Each correct answer represents a complete solution. Choose all that apply.

A.
It supports task compression files.
A.
It supports task compression files.
Answers
B.
It works well with large disk, because the cluster size increases as the disk partition size increases.
B.
It works well with large disk, because the cluster size increases as the disk partition size increases.
Answers
C.
It does not support file protection.
C.
It does not support file protection.
Answers
D.
It supports the Linux operating system.
D.
It supports the Linux operating system.
Answers
Suggested answer: A, B

Which of the following policy to add additional information to public safety posture and aims to protect workers and the organizations of inefficiency or confusion?

A.
user policy
A.
user policy
Answers
B.
IT policy
B.
IT policy
Answers
C.
None
C.
None
Answers
D.
Group policy
D.
Group policy
Answers
E.
Subject-specific security
E.
Subject-specific security
Answers
Suggested answer: E

Which of the following protocols are used to exchange routing information between the two gateways network of autonomous systems?

A.
None
A.
None
Answers
B.
IGMP
B.
IGMP
Answers
C.
EGP
C.
EGP
Answers
D.
ICMP
D.
ICMP
Answers
E.
OSPF
E.
OSPF
Answers
Suggested answer: C
Total 613 questions
Go to page: of 62