ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 45

Add to Whishlist

List of questions

Question 441

Report Export Collapse

An attacker has access to password hashes of a windows 7 computer. Which of the following attacks can the attacker use to reveal the passwords?

Become a Premium Member for full access
  Unlock Premium Member

Question 442

Report Export Collapse

Which NIST Incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?

Become a Premium Member for full access
  Unlock Premium Member

Question 443

Report Export Collapse

James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. Which of the following Wireshark filters will he use?

Become a Premium Member for full access
  Unlock Premium Member

Question 444

Report Export Collapse

Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?

Become a Premium Member for full access
  Unlock Premium Member

Question 445

Report Export Collapse

Which of the following systems includes an independent NAS Head and multiple storage arrays?

Become a Premium Member for full access
  Unlock Premium Member

Question 446

Report Export Collapse

You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region.

You suspect a DoS incident on the network. What will be your first reaction as a first responder?

Become a Premium Member for full access
  Unlock Premium Member

Question 447

Report Export Collapse

The security network team is trying to implement a firewall capable of operating only in the session layer, monitoring the TCP inter-packet link protocol to determine when a requested session is legitimate or not. Using this type of firewall, they could be able to intercept the communication, making the external network see that the firewall is the source, and facing the user, who responds from the outside is the firewall itself. They are just limiting a requirements previous listed, because they already have a packet filtering firewall and they must add a cheap solution that meets the objective. What kind of firewall would you recommend?

Become a Premium Member for full access
  Unlock Premium Member

Question 448

Report Export Collapse

If a network is at risk resulting from misconfiguration performed by unskilled and/or unqualified individuals, what type of threat is this?

Become a Premium Member for full access
  Unlock Premium Member

Question 449

Report Export Collapse

John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt? (Choose all that apply.)

Become a Premium Member for full access
  Unlock Premium Member

Question 450

Report Export Collapse

Michael decides to view the ________ to track employee actions on the organization's network.

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions