ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











The SOC manager is reviewing logs in AlienVault USM to investigate an intrusion on the network. Which CND approach is being used?

A.
Retrospective
A.
Retrospective
Answers
B.
Reactive
B.
Reactive
Answers
C.
Deterrent
C.
Deterrent
Answers
D.
Preventive
D.
Preventive
Answers
Suggested answer: A

According to the company's security policy, all access to any network resources must use Windows Active Directory Authentication. A Linux server was recently installed to run virtual servers and it is not using Windows Authentication.

What needs to happen to force this server to use Windows Authentication?

A.
Edit the ADLIN file.
A.
Edit the ADLIN file.
Answers
B.
Remove the /var/bin/localauth.conf file.
B.
Remove the /var/bin/localauth.conf file.
Answers
C.
Edit the PAM file to enforce Windows Authentication.
C.
Edit the PAM file to enforce Windows Authentication.
Answers
D.
Edit the shadow file.
D.
Edit the shadow file.
Answers
Suggested answer: C

Which VPN QoS model guarantees the traffic from one customer edge (CE) to another?

A.
Pipe model
A.
Pipe model
Answers
B.
Hose model
B.
Hose model
Answers
C.
AAA model
C.
AAA model
Answers
D.
Hub-and-Spoke VPN model
D.
Hub-and-Spoke VPN model
Answers
Suggested answer: A

Heather has been tasked with setting up and implementing VPN tunnels to remote offices. She will most likely be implementing IPsec VPN tunnels to connect the offices. At what layer of the OSI model does an IPsec tunnel function on?

A.
They function on the data link layer.
A.
They function on the data link layer.
Answers
B.
They work on the network layer.
B.
They work on the network layer.
Answers
C.
They function on either the application or the physical layer.
C.
They function on either the application or the physical layer.
Answers
D.
They work on the session layer.
D.
They work on the session layer.
Answers
Suggested answer: B

Management asked their network administrator to suggest an appropriate backup medium for their backup plan that best suits their organization's need. Which of the following factors will the administrator consider when deciding on the appropriate backup medium? (Choose all that apply.)

A.
Reliability
A.
Reliability
Answers
B.
Capability
B.
Capability
Answers
C.
Accountability
C.
Accountability
Answers
D.
Extensibility
D.
Extensibility
Answers
Suggested answer: A, B, D

John wants to implement a firewall service that works at the session layer of the OSI model. The firewall must also have the ability to hide the private network information. Which type of firewall service is John thinking of implementing?

A.
Packet Filtering
A.
Packet Filtering
Answers
B.
Circuit level gateway
B.
Circuit level gateway
Answers
C.
Application level gateway
C.
Application level gateway
Answers
D.
Stateful Multilayer Inspection
D.
Stateful Multilayer Inspection
Answers
Suggested answer: B

Which of the following attack signature analysis techniques are implemented to examine the header information and conclude that a packet has been altered?

A.
Composite signature-based analysis
A.
Composite signature-based analysis
Answers
B.
Atomic signature-based analysis
B.
Atomic signature-based analysis
Answers
C.
Content-based signature analysis
C.
Content-based signature analysis
Answers
D.
Context-based signature analysis
D.
Context-based signature analysis
Answers
Suggested answer: D

Lyle is the IT director for a medium-sized food service supply company in Nebraska. Lyle's company employs over 300 workers, half of which use computers. He recently came back from a security training seminar on logical security. He now wants to ensure his company is as secure as possible. Lyle has many network nodes and workstation nodes across the network. He does not have much time for implementing a network-wide solution. He is primarily concerned about preventing any external attacks on the network by using a solution that can drop packets if they are found to be malicious. Lyle also wants this solution to be easy to implement and be network-wide. What type of solution would be best for Lyle?

A.
He should choose a HIPS solution, as this is best suited to his needs.
A.
He should choose a HIPS solution, as this is best suited to his needs.
Answers
B.
Lyle would be best suited if he chose a NIPS implementation.
B.
Lyle would be best suited if he chose a NIPS implementation.
Answers
C.
A NEPT implementation would be the best choice.
C.
A NEPT implementation would be the best choice.
Answers
D.
To better serve the security needs of his company, Lyle should use a HIDS system.
D.
To better serve the security needs of his company, Lyle should use a HIDS system.
Answers
Suggested answer: B

Which of the following VPN topologies establishes a persistent connection between an organization's main office and its branch offices using a third-party network or the Internet?

A.
Hub-and-Spoke
A.
Hub-and-Spoke
Answers
B.
Full Mesh
B.
Full Mesh
Answers
C.
Point-to-Point
C.
Point-to-Point
Answers
D.
Star
D.
Star
Answers
Suggested answer: A

Which of the following is a best practice for wireless network security?

A.
Do not placing packet filter between the AP and the corporate intranet
A.
Do not placing packet filter between the AP and the corporate intranet
Answers
B.
Using SSID cloaking
B.
Using SSID cloaking
Answers
C.
Do not changing the default SSID
C.
Do not changing the default SSID
Answers
D.
Enabling the remote router login
D.
Enabling the remote router login
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62