ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 39

Question list
Search
Search

List of questions

Search

Related questions











Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented. What is the correct hierarchy for a security policy implementation?

A.
Procedures, Policies, Laws, Standards and Regulations
A.
Procedures, Policies, Laws, Standards and Regulations
Answers
B.
Laws, Regulations, Policies, Standards and Procedures
B.
Laws, Regulations, Policies, Standards and Procedures
Answers
C.
Regulations, Policies, Laws, Standards and Procedures
C.
Regulations, Policies, Laws, Standards and Procedures
Answers
D.
Laws, Policies, Regulations, Procedures and Standards
D.
Laws, Policies, Regulations, Procedures and Standards
Answers
Suggested answer: B

The _______ protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

A.
RARP
A.
RARP
Answers
B.
ICMP
B.
ICMP
Answers
C.
ARP
C.
ARP
Answers
D.
DHCP
D.
DHCP
Answers
Suggested answer: B

Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is a problem connecting to the main server. How will you prioritize these two incidents?

A.
Based on a first come first served basis
A.
Based on a first come first served basis
Answers
B.
Based on the type of response needed for the incident
B.
Based on the type of response needed for the incident
Answers
C.
Based on a potential technical effect of the incident
C.
Based on a potential technical effect of the incident
Answers
D.
Based on approval from management
D.
Based on approval from management
Answers
Suggested answer: C

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?

A.
Their first step is the acquisition of required documents, reviewing of security policies and compliance.
A.
Their first step is the acquisition of required documents, reviewing of security policies and compliance.
Answers
B.
Their first step is to create an initial Executive report to show the management team.
B.
Their first step is to create an initial Executive report to show the management team.
Answers
C.
Their first step is to make a hypothesis of what their final findings will be.
C.
Their first step is to make a hypothesis of what their final findings will be.
Answers
D.
Their first step is to analyze the data they have currently gathered from the company or interviews.
D.
Their first step is to analyze the data they have currently gathered from the company or interviews.
Answers
Suggested answer: A

A local bank wants to protect their card holder data. The bank should comply with the __________ standard to ensure the security of card holder data.

A.
PCI DSS
A.
PCI DSS
Answers
B.
SOX
B.
SOX
Answers
C.
HIPAA
C.
HIPAA
Answers
D.
ISEC
D.
ISEC
Answers
Suggested answer: A

Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?

A.
Mandatory access control
A.
Mandatory access control
Answers
B.
Non-discretionary access control
B.
Non-discretionary access control
Answers
C.
Discretionary access control
C.
Discretionary access control
Answers
D.
Role-based access control
D.
Role-based access control
Answers
Suggested answer: C

Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works. The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of solution does Fred's boss want to implement?

A.
Fred's boss wants Fred to monitor a NIPS system.
A.
Fred's boss wants Fred to monitor a NIPS system.
Answers
B.
Fred's boss wants to implement a HIDS solution.
B.
Fred's boss wants to implement a HIDS solution.
Answers
C.
Fred's boss wants a NIDS implementation.
C.
Fred's boss wants a NIDS implementation.
Answers
D.
Fred's boss wants to implement a HIPS solution.
D.
Fred's boss wants to implement a HIPS solution.
Answers
Suggested answer: B

Which of the following can be used to suppress fire from Class K sources?

A.
Water
A.
Water
Answers
B.
Carbon dioxide
B.
Carbon dioxide
Answers
C.
Foam
C.
Foam
Answers
D.
Dry Chemical
D.
Dry Chemical
Answers
Suggested answer: C

Match the following NIST security life cycle components with their activities:

A.
1-iv, 2- iii,3-v,4-i
A.
1-iv, 2- iii,3-v,4-i
Answers
B.
1-ii,2-i,3-v,4-iv
B.
1-ii,2-i,3-v,4-iv
Answers
C.
1-i,2-v,3-iii,4-ii
C.
1-i,2-v,3-iii,4-ii
Answers
D.
1-iii,2-iv,3-v,4-i
D.
1-iii,2-iv,3-v,4-i
Answers
Suggested answer: A

What is the correct order of activities that a IDS is supposed to attempt in order of detect an intrusion?

A.
Prevention, Intrusion Monitoring, intrusion Detection, Response
A.
Prevention, Intrusion Monitoring, intrusion Detection, Response
Answers
B.
Intrusion Detection, Response, Prevention, Intrusion Monitoring
B.
Intrusion Detection, Response, Prevention, Intrusion Monitoring
Answers
C.
Intrusion Monitoring, Intrusion Detection, Response, Prevention
C.
Intrusion Monitoring, Intrusion Detection, Response, Prevention
Answers
D.
Prevention, intrusion Detection, Response, Intrusion Monitoring
D.
Prevention, intrusion Detection, Response, Intrusion Monitoring
Answers
Suggested answer: A
Total 613 questions
Go to page: of 62