ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 40

Add to Whishlist

List of questions

Question 391

Report Export Collapse

Larry is a network administrator working for a manufacturing company in Detroit. Larry is responsible for the entire company's network which consists of 300 workstations and 25 servers. After using a hosted email service for a year, the company wants to cut back on costs and bring the email control internal. Larry likes this idea because it will give him more control over email. Larry wants to purchase a server for email but he does not want the server to be on the internal network because this might cause security risks. He decides to place the email server on the outside of the company's internal firewall. There is another firewall connected directly to the Internet that will protect some traffic from accessing the email server; the server will essentially be place between the two firewalls.

What logical area is Larry going to place the new email server into?

Become a Premium Member for full access
  Unlock Premium Member

Question 392

Report Export Collapse

Stephanie is currently setting up email security so all company data is secured when passed through email. Stephanie first sets up encryption to make sure that a specific user's email is protected. Next, she needs to ensure that the incoming and the outgoing mail has not been modified or altered using digital signatures.

What is Stephanie working on?

Become a Premium Member for full access
  Unlock Premium Member

Question 393

Report Export Collapse

Which of the following interfaces uses hot plugging technique to replace computer components without the need to shut down the system?

Become a Premium Member for full access
  Unlock Premium Member

Question 394

Report Export Collapse

Alex is administering the firewall in the organization's network. What command will he use to check all the remote addresses and ports in numerical form?

Become a Premium Member for full access
  Unlock Premium Member

Question 395

Report Export Collapse

Which type of wireless network attack is characterized by an attacker using a high gain amplifier from a nearby location to drown out the legitimate access point signal?

Become a Premium Member for full access
  Unlock Premium Member

Question 396

Report Export Collapse

Which of the following RAID storage techniques divides the data into multiple blocks, which are further written across the RAID system?

Become a Premium Member for full access
  Unlock Premium Member

Question 397

Report Export Collapse

Management decides to implement a risk management system to reduce and maintain the organization's risk at an acceptable level. Which of the following is the correct order in the risk management phase?

Become a Premium Member for full access
  Unlock Premium Member

Question 398

Report Export Collapse

You want to increase your network security implementing a technology that only allows certain MAC addresses in specific ports in the switches; which one of the above is the best choice?

Become a Premium Member for full access
  Unlock Premium Member

Question 399

Report Export Collapse

Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response.

Blake is outlining the level of severity for each type of incident in the plan. Unsuccessful scans and probes are at what severity level?

Become a Premium Member for full access
  Unlock Premium Member

Question 400

Report Export Collapse

An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both detect and stop malicious traffic?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions