ECCouncil 312-38 Practice Test - Questions Answers, Page 45

List of questions
Question 441

An attacker has access to password hashes of a windows 7 computer. Which of the following attacks can the attacker use to reveal the passwords?
Question 442

Which NIST Incident category includes any activity that seeks to access or identify a federal agency computer, open ports, protocols, service or any combination for later exploit?
Question 443

James is working as a Network Administrator in a reputed company situated in California. He is monitoring his network traffic with the help of Wireshark. He wants to check and analyze the traffic against a PING sweep attack. Which of the following Wireshark filters will he use?
Question 444

Management wants to bring their organization into compliance with the ISO standard for information security risk management. Which ISO standard will management decide to implement?
Question 445

Which of the following systems includes an independent NAS Head and multiple storage arrays?
Question 446

You are monitoring your network traffic with the Wireshark utility and noticed that your network is experiencing a large amount of traffic from a certain region.
You suspect a DoS incident on the network. What will be your first reaction as a first responder?
Question 447

The security network team is trying to implement a firewall capable of operating only in the session layer, monitoring the TCP inter-packet link protocol to determine when a requested session is legitimate or not. Using this type of firewall, they could be able to intercept the communication, making the external network see that the firewall is the source, and facing the user, who responds from the outside is the firewall itself. They are just limiting a requirements previous listed, because they already have a packet filtering firewall and they must add a cheap solution that meets the objective. What kind of firewall would you recommend?
Question 448

If a network is at risk resulting from misconfiguration performed by unskilled and/or unqualified individuals, what type of threat is this?
Question 449

John is a network administrator and is monitoring his network traffic with the help of Wireshark. He suspects that someone from outside is making a TCP OS fingerprinting attempt on his organization's network. Which of following Wireshark filter(s) will he use to locate the TCP OS fingerprinting attempt? (Choose all that apply.)
Question 450

Michael decides to view the ________ to track employee actions on the organization's network.
Question