ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 32

Add to Whishlist

List of questions

Question 311

Report Export Collapse

FILL BLANK

Fill in the blanks with the appropriate terms. In L2TP ______________ tunnel mode, the ISP must support L2TP, whereas in L2TP tunnel mode, the ISP does not need to support L2TP.

Become a Premium Member for full access
  Unlock Premium Member

Question 312

Report Export Collapse

Jason works as a System Administrator for www.company.com Inc. The company has a Windows-based network. Sam, an employee of the company, accidentally changes some of the applications and system settings. He complains to Jason that his system is not working properly. To troubleshoot the problem, Jason diagnoses the internals of his computer and observes that some changes have been made in Sam's computer registry. To rectify the issue, Jason has to restore the registry. Which of the following utilities can Jason use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 313

Report Export Collapse

Adam works as a Security Analyst for Umbrella Inc. The company has a Linux-based network comprising an Apache server for Web applications. He received the following Apache Web server log, which is as follows:

[Sat Nov 16 14:32:52 2009] [error] [client 128.0.0.7] client denied by server configuration: /export/home/htdocs/test

The first piece in the log entry is the date and time of the log message. The second entry determines the severity of the error being reported.

Now Adam wants to change the severity level to control the types of errors that are sent to the error log. Which of the following directives will Adam use to accomplish the task?

Become a Premium Member for full access
  Unlock Premium Member

Question 314

Report Export Collapse

Which of the following strategies is used to minimize the effects of a disruptive event on a company, and is created to prevent interruptions to normal business activity?

Become a Premium Member for full access
  Unlock Premium Member

Question 315

Report Export Collapse

Which of the following standards is a change in the original IEEE 802.11 and defines the security mechanisms for wireless networks?

Become a Premium Member for full access
  Unlock Premium Member

Question 316

Report Export Collapse

Which of the following representatives of the incident response team takes the forensic backups of systems that are essential event?

Become a Premium Member for full access
  Unlock Premium Member

Question 317

Report Export Collapse

You work for a professional computer hacking forensic investigator DataEnet Inc. To explore the e-mail information about an employee of the company. The suspect an employee to use the online e-mail systems such as Hotmail or Yahoo. Which of the following folders on the local computer you are going to check to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 318

Report Export Collapse

Which of the following statements is not true about the FAT16 file system? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 319

Report Export Collapse

Which of the following policy to add additional information to public safety posture and aims to protect workers and the organizations of inefficiency or confusion?

Become a Premium Member for full access
  Unlock Premium Member

Question 320

Report Export Collapse

Which of the following protocols are used to exchange routing information between the two gateways network of autonomous systems?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions