ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 44

Add to Whishlist

List of questions

Question 431

Report Export Collapse

Which of the following is a process of transformation where the old system can no longer be maintained?

Become a Premium Member for full access
  Unlock Premium Member

Question 432

Report Export Collapse

Which of the following phases is the first step towards creating a business continuity plan?

Become a Premium Member for full access
  Unlock Premium Member

Question 433

Report Export Collapse

James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company, schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?

Become a Premium Member for full access
  Unlock Premium Member

Question 434

Report Export Collapse

David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the _________ framework, as it provides a set of controls over IT and consolidates them to form a framework.

Become a Premium Member for full access
  Unlock Premium Member

Question 435

Report Export Collapse

Identify the password cracking attempt involving precomputed hash values stored as plaintext and used to crack the password.

Become a Premium Member for full access
  Unlock Premium Member

Question 436

Report Export Collapse

John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?

Become a Premium Member for full access
  Unlock Premium Member

Question 437

Report Export Collapse

Which of the following types of information can be obtained through network sniffing? (Choose all that apply.)

Become a Premium Member for full access
  Unlock Premium Member

Question 438

Report Export Collapse

The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?

Become a Premium Member for full access
  Unlock Premium Member

Question 439

Report Export Collapse

Which of the following incident handling stage removes the root cause of the incident?

Become a Premium Member for full access
  Unlock Premium Member

Question 440

Report Export Collapse

Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions