ECCouncil 312-38 Practice Test - Questions Answers, Page 40
List of questions
Related questions
Larry is a network administrator working for a manufacturing company in Detroit. Larry is responsible for the entire company's network which consists of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to cut back on costs and bring the email control internal. Larry likes this idea because it will give him more control over email. Larry wants to purchase a server for email but he does not want the server to be on the internal network because this might cause security risks. He decides to place the email server on the outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect some traffic from accessing the email server; the server will essentially be place between the two firewalls.
What logical area is Larry going to place the new email server into?
Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures.
What is Stephanie working on?
Which of the following interfaces uses hot plugging technique to replace computer components without the need to shut down the system?
Alex is administering the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?
Which type of wireless network attack is characterized by an attacker using a high gain amplifier from a nearby location to drown out the legitimate access point signal?
Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?
Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?
You want to increase your network security implementing a technology that only allows certain MAC addresses in specific ports in the switches; which one of the above is the best choice?
Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response.
Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?
An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both detect and stop malicious traffic?
Question