ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 39

Add to Whishlist

List of questions

Question 381

Report Export Collapse

Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented. What is the correct hierarchy for a security policy implementation?

Become a Premium Member for full access
  Unlock Premium Member

Question 382

Report Export Collapse

The _______ protocol works in the network layer and is responsible for handling the error codes during the delivery of packets. This protocol is also responsible for providing communication in the TCP/IP stack.

Become a Premium Member for full access
  Unlock Premium Member

Question 383

Report Export Collapse

Assume that you are working as a network administrator in the head office of a bank. One day a bank employee informed you that she is unable to log in to her system. At the same time, you get a call from another network administrator informing you that there is a problem connecting to the main server. How will you prioritize these two incidents?

Become a Premium Member for full access
  Unlock Premium Member

Question 384

Report Export Collapse

Smith is an IT technician that has been appointed to his company's network vulnerability assessment team. He is the only IT employee on the team. The other team members include employees from Accounting, Management, Shipping, and Marketing. Smith and the team members are having their first meeting to discuss how they will proceed. What is the first step they should do to create the network vulnerability assessment plan?

Become a Premium Member for full access
  Unlock Premium Member

Question 385

Report Export Collapse

A local bank wants to protect their card holder data. The bank should comply with the __________ standard to ensure the security of card holder data.

Become a Premium Member for full access
  Unlock Premium Member

Question 386

Report Export Collapse

Ross manages 30 employees and only 25 computers in the organization. The network the company uses is a peer-to-peer. Ross configures access control measures allowing the employees to set their own control measures for their files and folders. Which access control did Ross implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 387

Report Export Collapse

Fred is a network technician working for Johnson Services, a temporary employment agency in Boston. Johnson Services has three remote offices in New England and the headquarters in Boston where Fred works. The company relies on a number of customized applications to perform daily tasks and unfortunately these applications require users to be local administrators. Because of this, Fred's supervisor wants to implement tighter security measures in other areas to compensate for the inherent risks in making those users local admins. Fred's boss wants a solution that will be placed on all computers throughout the company and monitored by Fred. This solution will gather information on all network traffic to and from the local computers without actually affecting the traffic. What type of solution does Fred's boss want to implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 388

Report Export Collapse

Which of the following can be used to suppress fire from Class K sources?

Become a Premium Member for full access
  Unlock Premium Member

Question 389

Report Export Collapse

Match the following NIST security life cycle components with their activities:

ECCouncil 312-38 image Question 389 23677 09182024184738000000

Become a Premium Member for full access
  Unlock Premium Member

Question 390

Report Export Collapse

What is the correct order of activities that a IDS is supposed to attempt in order of detect an intrusion?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions