ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 40

Question list
Search
Search

List of questions

Search

Related questions











Larry is a network administrator working for a manufacturing company in Detroit. Larry is responsible for the entire company's network which consists of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to cut back on costs and bring the email control internal. Larry likes this idea because it will give him more control over email. Larry wants to purchase a server for email but he does not want the server to be on the internal network because this might cause security risks. He decides to place the email server on the outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect some traffic from accessing the email server; the server will essentially be place between the two firewalls.

What logical area is Larry going to place the new email server into?

A.
He is going to place the server in a Demilitarized Zone (DMZ).
A.
He is going to place the server in a Demilitarized Zone (DMZ).
Answers
B.
He will put the email server in an IPSec zone.
B.
He will put the email server in an IPSec zone.
Answers
C.
For security reasons, Larry is going to place the email server in the company's Logical Buffer Zone (LBZ).
C.
For security reasons, Larry is going to place the email server in the company's Logical Buffer Zone (LBZ).
Answers
D.
Larry is going to put the email server in a hot-server zone.
D.
Larry is going to put the email server in a hot-server zone.
Answers
Suggested answer: A

Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures.

What is Stephanie working on?

A.
Usability
A.
Usability
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Availability
C.
Availability
Answers
D.
Data Integrity
D.
Data Integrity
Answers
Suggested answer: D

Which of the following interfaces uses hot plugging technique to replace computer components without the need to shut down the system?

A.
SATA
A.
SATA
Answers
B.
SCSI
B.
SCSI
Answers
C.
IDE
C.
IDE
Answers
D.
SDRAM
D.
SDRAM
Answers
Suggested answer: B

Alex is administering the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?

A.
netstat -a
A.
netstat -a
Answers
B.
netstat -ao
B.
netstat -ao
Answers
C.
netstat -o
C.
netstat -o
Answers
D.
netstat -an
D.
netstat -an
Answers
Suggested answer: D

Which type of wireless network attack is characterized by an attacker using a high gain amplifier from a nearby location to drown out the legitimate access point signal?

A.
Rogue access point attack
A.
Rogue access point attack
Answers
B.
Ad Hoc Connection attack
B.
Ad Hoc Connection attack
Answers
C.
Jamming signal attack
C.
Jamming signal attack
Answers
D.
Unauthorized association
D.
Unauthorized association
Answers
Suggested answer: C

Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?

A.
Striping
A.
Striping
Answers
B.
None of these
B.
None of these
Answers
C.
Parity
C.
Parity
Answers
D.
Mirroring
D.
Mirroring
Answers
Suggested answer: A

Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?

A.
Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review
A.
Risk Identification, Risk Assessment, Risk Treatment, Risk Monitoring & Review
Answers
B.
Risk Identification, Risk Assessment, Risk Monitoring & Review, Risk Treatment
B.
Risk Identification, Risk Assessment, Risk Monitoring & Review, Risk Treatment
Answers
C.
Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk Assessment
C.
Risk Treatment, Risk Monitoring & Review, Risk Identification, Risk Assessment
Answers
D.
Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk Identification
D.
Risk Assessment, Risk Treatment, Risk Monitoring & Review, Risk Identification
Answers
Suggested answer: A

You want to increase your network security implementing a technology that only allows certain MAC addresses in specific ports in the switches; which one of the above is the best choice?

A.
Port Security
A.
Port Security
Answers
B.
Port Authorization
B.
Port Authorization
Answers
C.
Port Detection
C.
Port Detection
Answers
D.
Port Knocking
D.
Port Knocking
Answers
Suggested answer: A

Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response.

Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

A.
Extreme severity level
A.
Extreme severity level
Answers
B.
Low severity level
B.
Low severity level
Answers
C.
High severity level
C.
High severity level
Answers
D.
Mid severity level
D.
Mid severity level
Answers
Suggested answer: B

An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both detect and stop malicious traffic?

A.
passive mode
A.
passive mode
Answers
B.
inline mode
B.
inline mode
Answers
C.
promiscuous mode
C.
promiscuous mode
Answers
D.
firewall mode
D.
firewall mode
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62