ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a process of transformation where the old system can no longer be maintained?

A.
Disaster
A.
Disaster
Answers
B.
Risk
B.
Risk
Answers
C.
Threat
C.
Threat
Answers
D.
Crisis
D.
Crisis
Answers
Suggested answer: D

Which of the following phases is the first step towards creating a business continuity plan?

A.
Business Impact Assessment
A.
Business Impact Assessment
Answers
B.
Scope and Plan Initiation
B.
Scope and Plan Initiation
Answers
C.
Business Continuity Plan Development
C.
Business Continuity Plan Development
Answers
D.
Plan Approval and Implementation
D.
Plan Approval and Implementation
Answers
Suggested answer: B

James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company, schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?

A.
James should utilize the free OTP software package.
A.
James should utilize the free OTP software package.
Answers
B.
James can enforce mandatory HTTPS in the email clients to encrypt emails.
B.
James can enforce mandatory HTTPS in the email clients to encrypt emails.
Answers
C.
James could use PGP as a free option for encrypting the company's emails.
C.
James could use PGP as a free option for encrypting the company's emails.
Answers
D.
James can use MD5 algorithm to encrypt all the emails.
D.
James can use MD5 algorithm to encrypt all the emails.
Answers
Suggested answer: C

David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the _________ framework, as it provides a set of controls over IT and consolidates them to form a framework.

A.
COBIT
A.
COBIT
Answers
B.
ITIL
B.
ITIL
Answers
C.
ISO 27007
C.
ISO 27007
Answers
D.
RMIS
D.
RMIS
Answers
Suggested answer: A

Identify the password cracking attempt involving precomputed hash values stored as plaintext and used to crack the password.

A.
Bruteforce
A.
Bruteforce
Answers
B.
Rainbow table
B.
Rainbow table
Answers
C.
Hybrid
C.
Hybrid
Answers
D.
Dictionary
D.
Dictionary
Answers
Suggested answer: B

John, the network administrator and he wants to enable the NetFlow feature in Cisco routers to collect and monitor the IP network traffic passing through the router. Which command will John use to enable NetFlow on an interface?

A.
Router IP route
A.
Router IP route
Answers
B.
Router(Config-if) # IP route cache flow
B.
Router(Config-if) # IP route cache flow
Answers
C.
Router# Netmon enable
C.
Router# Netmon enable
Answers
D.
Router# netflow enable
D.
Router# netflow enable
Answers
Suggested answer: B

Which of the following types of information can be obtained through network sniffing? (Choose all that apply.)

A.
DNS traffic
A.
DNS traffic
Answers
B.
Telnet passwords
B.
Telnet passwords
Answers
C.
Programming errors
C.
Programming errors
Answers
D.
Syslog traffic
D.
Syslog traffic
Answers
Suggested answer: A, C, D

The network administrator wants to strengthen physical security in the organization. Specifically, to implement a solution stopping people from entering certain restricted zones without proper credentials. Which of following physical security measures should the administrator use?

A.
Mantrap
A.
Mantrap
Answers
B.
Bollards
B.
Bollards
Answers
C.
Video surveillance
C.
Video surveillance
Answers
D.
Fence
D.
Fence
Answers
Suggested answer: A

Which of the following incident handling stage removes the root cause of the incident?

A.
Eradication
A.
Eradication
Answers
B.
Recovery
B.
Recovery
Answers
C.
Detection
C.
Detection
Answers
D.
Containment
D.
Containment
Answers
Suggested answer: A

Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?

A.
Justine needs to install a biometrics station at each entrance.
A.
Justine needs to install a biometrics station at each entrance.
Answers
B.
She should install a mantrap.
B.
She should install a mantrap.
Answers
C.
She should install a Thompson Trapdoor.
C.
She should install a Thompson Trapdoor.
Answers
D.
Justine will need to install a revolving security door.
D.
Justine will need to install a revolving security door.
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62