ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











You are using Wireshark to monitor your network traffic and you see a lot of packages with the FIN, PUSH and URG flags activated; what can you infer about this behavior?

A.
The Layer 3 Controls are activated in the Switches
A.
The Layer 3 Controls are activated in the Switches
Answers
B.
The Spanning Tree Protocol is activated in the Switches
B.
The Spanning Tree Protocol is activated in the Switches
Answers
C.
One NIC is broadcasting erroneous traffic
C.
One NIC is broadcasting erroneous traffic
Answers
D.
An attacker is running a XMAS scan against the network
D.
An attacker is running a XMAS scan against the network
Answers
Suggested answer: D

The Circuit-level gateway firewall technology functions at which of the following OSI layer?

A.
Transport layer
A.
Transport layer
Answers
B.
Data-link layer
B.
Data-link layer
Answers
C.
Session layer
C.
Session layer
Answers
D.
Network layer
D.
Network layer
Answers
Suggested answer: C

Individuals in the organization using system resources in a way that violates acceptable usage policies indicates which of the following security incident(s):

A.
Unauthorized Access
A.
Unauthorized Access
Answers
B.
Improper Usage
B.
Improper Usage
Answers
C.
Denial-of-Service (DoS)
C.
Denial-of-Service (DoS)
Answers
D.
Malicious Code
D.
Malicious Code
Answers
Suggested answer: B

The GMT enterprise is working on their internet and web usage policies. GMT would like to control internet bandwidth consumption by employees. Which group of policies would this belong to?

A.
Enterprise Information Security Policy
A.
Enterprise Information Security Policy
Answers
B.
Network Services Specific Security Policy
B.
Network Services Specific Security Policy
Answers
C.
Issue Specific Security Policy
C.
Issue Specific Security Policy
Answers
D.
System Specific Security Policy
D.
System Specific Security Policy
Answers
Suggested answer: C

Which of the following intrusion detection techniques observes the network for abnormal usage patterns by determining the performance parameters for regular activities and monitoring for actions beyond the normal parameters?

A.
Statistical anomaly detection
A.
Statistical anomaly detection
Answers
B.
Signature/Pattern matching
B.
Signature/Pattern matching
Answers
C.
None of these
C.
None of these
Answers
D.
Stateful protocol analysis
D.
Stateful protocol analysis
Answers
Suggested answer: A

An administrator wants to monitor and inspect large amounts of traffic and detect unauthorized attempts from inside the organization, with the help of an IDS.

They are not able to recognize the exact location to deploy the IDS sensor. Can you help him spot the location where the IDS sensor should be placed?

A.
Location 1
A.
Location 1
Answers
B.
Location 2
B.
Location 2
Answers
C.
Location 3
C.
Location 3
Answers
D.
Location 4
D.
Location 4
Answers
Suggested answer: A

Steven's company has recently grown from 5 employees to over 50. Every workstation has a public IP address and navigated to the Internet with little to no protection. Steven wants to use a firewall. He also wants IP addresses to be private addresses, to prevent public Internet devices direct access to them. What should Steven implement on the firewall to ensure this happens?

A.
Steven should use Open Shortest Path First (OSPF).
A.
Steven should use Open Shortest Path First (OSPF).
Answers
B.
Steven should enable Network Address Translation (NAT).
B.
Steven should enable Network Address Translation (NAT).
Answers
C.
Steven should use a Demilitarized Zone (DMZ).
C.
Steven should use a Demilitarized Zone (DMZ).
Answers
D.
Steven should use IPsec.
D.
Steven should use IPsec.
Answers
Suggested answer: C

Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?

A.
Incident Response Policy (IRP)
A.
Incident Response Policy (IRP)
Answers
B.
Issue Specific Security Policy (ISSP)
B.
Issue Specific Security Policy (ISSP)
Answers
C.
Enterprise Information Security Policy (EISP)
C.
Enterprise Information Security Policy (EISP)
Answers
D.
System Specific Security Policy (SSSP)
D.
System Specific Security Policy (SSSP)
Answers
Suggested answer: D

During the recovery process, RTO and RPO should be the main parameters of your disaster recovery plan. What does RPO refer to?

A.
The encryption feature, acting as add-on security to the data
A.
The encryption feature, acting as add-on security to the data
Answers
B.
The hot plugging technique used to replace computer components
B.
The hot plugging technique used to replace computer components
Answers
C.
The duration required to restore the data
C.
The duration required to restore the data
Answers
D.
The interval after which the data quality is lost
D.
The interval after which the data quality is lost
Answers
Suggested answer: C

Ryan works as a network security engineer at an organization the recently suffered an attack. As a countermeasure, Ryan would like to obtain more information about the attacker and chooses to deploy a honeypot into the organizations production environment called Kojoney. Using this honeypot, he would like to emulate the network vulnerability that was attacked previously. Which type of honeypot is he trying to implement?

A.
High interaction honeypots
A.
High interaction honeypots
Answers
B.
Research honeypot
B.
Research honeypot
Answers
C.
Low interaction honeypots
C.
Low interaction honeypots
Answers
D.
Pure honeypots
D.
Pure honeypots
Answers
Suggested answer: C
Total 613 questions
Go to page: of 62