ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











You are Network Administrator Investment Bank. You're worried about people breeching network and can steal information before you can detect and shut down access. Which of the following is the best way to deal with this issue?

A.
To implement a strong firewall.
A.
To implement a strong firewall.
Answers
B.
Implement a honey pot.
B.
Implement a honey pot.
Answers
C.
To implement a strong password policy.
C.
To implement a strong password policy.
Answers
D.
None
D.
None
Answers
E.
To implement the network is based on antivirus.
E.
To implement the network is based on antivirus.
Answers
Suggested answer: B

Which of the following steps OPSEC process examines every aspect of the proposed operation to identify the OPSEC indicators that can reveal important information and then compare them with indicators of the opponent's intelligence collection capabilities identified in the previous activity?

A.
Identification of Critical Information
A.
Identification of Critical Information
Answers
B.
analysis weakness
B.
analysis weakness
Answers
C.
risk assessment
C.
risk assessment
Answers
D.
Appropriate OPSEC measures
D.
Appropriate OPSEC measures
Answers
E.
analysis of threats
E.
analysis of threats
Answers
Suggested answer: B

Which of the following recovery plans include specific strategies and actions to address the specific variances assumptions lead to a particular safety problem or emergency situation?

A.
Business Continuity Plan
A.
Business Continuity Plan
Answers
B.
disaster survival plan
B.
disaster survival plan
Answers
C.
None
C.
None
Answers
D.
The emergency plan
D.
The emergency plan
Answers
Suggested answer: D

Which of the following plans are documented and organized emergency backup operations and recovery operations maintained as part of the security program to ensure the availability of critical resources and facilitate the continuity of operations in case of emergency?

A.
Business Continuity Plan
A.
Business Continuity Plan
Answers
B.
The emergency plan
B.
The emergency plan
Answers
C.
None
C.
None
Answers
D.
disaster survival plan
D.
disaster survival plan
Answers
Suggested answer: B

Which of the following standards have been proposed for the improvement of 802.11a and 802.11b wireless local area network (WLAN) specifications, which provides a quality of service (QoS) features, such as the prioritization of data, voice and video transmissions?

A.
None
A.
None
Answers
B.
802.15
B.
802.15
Answers
C.
802.11h
C.
802.11h
Answers
D.
802.11n
D.
802.11n
Answers
E.
802.11e
E.
802.11e
Answers
Suggested answer: E

What are the responsibilities of the following disaster recovery team? Each correct answer represents a complete solution. Choose all that apply.

A.
Monitor the implementation of a disaster recovery plan and evaluate the results.
A.
Monitor the implementation of a disaster recovery plan and evaluate the results.
Answers
B.
To inform the management, the injured and the third parties about the disaster.
B.
To inform the management, the injured and the third parties about the disaster.
Answers
C.
Amend and update the disaster recovery plan according to lessons learned from previous disaster recovery efforts.
C.
Amend and update the disaster recovery plan according to lessons learned from previous disaster recovery efforts.
Answers
D.
Starts execution disaster recovery procedures.
D.
Starts execution disaster recovery procedures.
Answers
Suggested answer: A, B, C, D

Which has the following fields IPv6 header is reduced by 1 for each router that sends a packet?

A.
None
A.
None
Answers
B.
traffic class
B.
traffic class
Answers
C.
hop limit
C.
hop limit
Answers
D.
Next header
D.
Next header
Answers
E.
Flow label
E.
Flow label
Answers
Suggested answer: C

Which of the following tool is used for passive attacks to capture network traffic?

A.
Intrusion prevention system
A.
Intrusion prevention system
Answers
B.
Intrusion detection system
B.
Intrusion detection system
Answers
C.
Sniffer
C.
Sniffer
Answers
D.
warchalking
D.
warchalking
Answers
E.
None
E.
None
Answers
Suggested answer: C

Which of the following forms of recognition of the sender can inform the data receiver of all segments that have arrived successfully?

A.
negative acknowledgment
A.
negative acknowledgment
Answers
B.
the cumulative reset
B.
the cumulative reset
Answers
C.
with block
C.
with block
Answers
D.
None
D.
None
Answers
E.
selective acknowledgment
E.
selective acknowledgment
Answers
Suggested answer: E

Which of the following is a communication protocol multicasts messages and information of all the member IP multicast group?

A.
IGMP
A.
IGMP
Answers
B.
ICMP
B.
ICMP
Answers
C.
BGP
C.
BGP
Answers
D.
None
D.
None
Answers
E.
EGP
E.
EGP
Answers
Suggested answer: A
Total 613 questions
Go to page: of 62