ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Related questions











Which of the following acts as a verifier for the certificate authority?

A.
Registration authority
A.
Registration authority
Answers
B.
Certificate authority
B.
Certificate authority
Answers
C.
Directory management system
C.
Directory management system
Answers
D.
Certificate Management system
D.
Certificate Management system
Answers
Suggested answer: A

What is the best way to describe a mesh network topology?

A.
A network in which every computer in the network has a connection to each and every computer in the network.
A.
A network in which every computer in the network has a connection to each and every computer in the network.
Answers
B.
A network in which every computer meshes together to form a hybrid between a star and bus topology.
B.
A network in which every computer meshes together to form a hybrid between a star and bus topology.
Answers
C.
A network in which every computer in the network can communicate with a single central computer.
C.
A network in which every computer in the network can communicate with a single central computer.
Answers
D.
A network that is extremely cost efficient, offering the best option for allowing computers to communicate amongst each other.
D.
A network that is extremely cost efficient, offering the best option for allowing computers to communicate amongst each other.
Answers
Suggested answer: A

You are tasked to perform black hat vulnerability assessment for a client. You received official written permission to work with: company site, forum, Linux server with LAMP, where this site hosted. Which vulnerability assessment tool should you consider to use?

A.
dnsbrute
A.
dnsbrute
Answers
B.
hping
B.
hping
Answers
C.
OpenVAS
C.
OpenVAS
Answers
D.
wireshark
D.
wireshark
Answers
Suggested answer: C

Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?

A.
Verification
A.
Verification
Answers
B.
Mitigation
B.
Mitigation
Answers
C.
Remediation
C.
Remediation
Answers
D.
Assessment
D.
Assessment
Answers
Suggested answer: C

Nancy is working as a network administrator for a small company. Management wants to implement a RAID storage for their organization. They want to use the appropriate RAID level for their backup plan that will satisfy the following requirements:

1- It has a parity check to store all the information about the data in multiple drives

2- Help reconstruct the data during downtime.

3- Process the data at a good speed.

4- Should not be expensive.

The management team asks Nancy to research and suggest the appropriate RAID level that best suits their requirements. What RAID level will she suggest?

A.
RAID 3.
A.
RAID 3.
Answers
B.
RAID 1
B.
RAID 1
Answers
C.
RAID 0
C.
RAID 0
Answers
D.
RAID 10
D.
RAID 10
Answers
Suggested answer: A

A network designer needs to submit a proposal for a company, which has just published a web portal for its clients on the internet. Such a server needs to be isolated from the internal network, placing itself in a DMZ. Faced with this need, the designer will present a proposal for a firewall with three interfaces, one for the internet network, another for the DMZ server farm and another for the internal network. What kind of topology will the designer propose?

A.
Screened subnet
A.
Screened subnet
Answers
B.
Multi-homed firewall
B.
Multi-homed firewall
Answers
C.
Bastion host
C.
Bastion host
Answers
D.
DMZ, External-Internal firewall
D.
DMZ, External-Internal firewall
Answers
Suggested answer: B

The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all currently installed packages?

A.
You should run the up2data -u command.
A.
You should run the up2data -u command.
Answers
B.
You should run the up2date --d -f -u command.
B.
You should run the up2date --d -f -u command.
Answers
C.
You should run the WSUS --d -f -u command.
C.
You should run the WSUS --d -f -u command.
Answers
D.
You should type the sysupdate --d command.
D.
You should type the sysupdate --d command.
Answers
Suggested answer: B

Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other.

How will they ensure the authenticity of their emails?

A.
Dan will use his digital signature to sign his mails while Alex will use Dan's public key to verify the authenticity of the mails.
A.
Dan will use his digital signature to sign his mails while Alex will use Dan's public key to verify the authenticity of the mails.
Answers
B.
Dan will use his digital signature to sign his mails while Alex will use his private key to verify the authenticity of the mails.
B.
Dan will use his digital signature to sign his mails while Alex will use his private key to verify the authenticity of the mails.
Answers
C.
Dan will use his private key to encrypt his mails while Alex will use his digital signature to verify the authenticity of the mails.
C.
Dan will use his private key to encrypt his mails while Alex will use his digital signature to verify the authenticity of the mails.
Answers
D.
Dan will use his public key to encrypt his mails while Alex will use Dan's digital signature to verify the authenticity of the mails.
D.
Dan will use his public key to encrypt his mails while Alex will use Dan's digital signature to verify the authenticity of the mails.
Answers
Suggested answer: A

A VPN Concentrator acts as a bidirectional tunnel endpoint among host machines. What are the other function(s) of the device? (Choose all that apply.)

A.
Enables input/output (I/O) operations
A.
Enables input/output (I/O) operations
Answers
B.
Provides access memory, achieving high efficiency
B.
Provides access memory, achieving high efficiency
Answers
C.
Manages security keys
C.
Manages security keys
Answers
D.
Assigns user addresses
D.
Assigns user addresses
Answers
Suggested answer: C, D

Which characteristic of an antenna refers to how directional an antennas radiation pattern is?

A.
Radiation pattern
A.
Radiation pattern
Answers
B.
Polarization
B.
Polarization
Answers
C.
Directivity
C.
Directivity
Answers
D.
Typical gain
D.
Typical gain
Answers
Suggested answer: A
Total 613 questions
Go to page: of 62