ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 38

Add to Whishlist

List of questions

Question 371

Report Export Collapse

The SOC manager is reviewing logs in AlienVault USM to investigate an intrusion on the network. Which CND approach is being used?

Become a Premium Member for full access
  Unlock Premium Member

Question 372

Report Export Collapse

According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication.

What needs to happen to force this server to use Windows Authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 373

Report Export Collapse

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

Become a Premium Member for full access
  Unlock Premium Member

Question 374

Report Export Collapse

Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?

Become a Premium Member for full access
  Unlock Premium Member

Question 375

Report Export Collapse

Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium? (Choose all that apply.)

Become a Premium Member for full access
  Unlock Premium Member

Question 376

Report Export Collapse

John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?

Become a Premium Member for full access
  Unlock Premium Member

Question 377

Report Export Collapse

Which of the following attack signature analysis techniques are implemented to examine the header information and conclude that a packet has been altered?

Become a Premium Member for full access
  Unlock Premium Member

Question 378

Report Export Collapse

Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement and be network-wide. What type of solution would be best for Lyle?

Become a Premium Member for full access
  Unlock Premium Member

Question 379

Report Export Collapse

Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 380

Report Export Collapse

Which of the following is a best practice for wireless network security?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions