ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 42

Add to Whishlist

List of questions

Question 411

Report Export Collapse

You are using Wireshark to monitor your network traffic and you see a lot of packages with the FIN, PUSH and URG flags activated; what can you infer about this behavior?

Become a Premium Member for full access
  Unlock Premium Member

Question 412

Report Export Collapse

The Circuit-level gateway firewall technology functions at which of the following OSI layer?

Become a Premium Member for full access
  Unlock Premium Member

Question 413

Report Export Collapse

Individuals in the organization using system resources in a way that violates acceptable usage policies indicates which of the following security incident(s):

Become a Premium Member for full access
  Unlock Premium Member

Question 414

Report Export Collapse

The GMT enterprise is working on their internet and web usage policies. GMT would like to control internet bandwidth consumption by employees. Which group of policies would this belong to?

Become a Premium Member for full access
  Unlock Premium Member

Question 415

Report Export Collapse

Which of the following intrusion detection techniques observes the network for abnormal usage patterns by determining the performance parameters for regular activities and monitoring for actions beyond the normal parameters?

Become a Premium Member for full access
  Unlock Premium Member

Question 416

Report Export Collapse

An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS.

They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?

ECCouncil 312-38 image Question 416 23704 09182024184738000000

Become a Premium Member for full access
  Unlock Premium Member

Question 417

Report Export Collapse

Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?

Become a Premium Member for full access
  Unlock Premium Member

Question 418

Report Export Collapse

Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?

Become a Premium Member for full access
  Unlock Premium Member

Question 419

Report Export Collapse

During the recovery process, RTO and RPO should be the main parameters of your disaster recovery plan. What does RPO refer to?

Become a Premium Member for full access
  Unlock Premium Member

Question 420

Report Export Collapse

Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions