ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 47

Add to Whishlist

List of questions

Question 461

Report Export Collapse

Which field is not included in the TCP header?

Become a Premium Member for full access
  Unlock Premium Member

Question 462

Report Export Collapse

John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?

Become a Premium Member for full access
  Unlock Premium Member

Question 463

Report Export Collapse

What command is used to terminate certain processes in an Ubuntu system?

Become a Premium Member for full access
  Unlock Premium Member

Question 464

Report Export Collapse

Which type of wireless network threats an attacker stakes out the area from a nearby location with a high gain amplifier drowning out the legitimate access point?

Become a Premium Member for full access
  Unlock Premium Member

Question 465

Report Export Collapse

Which of the following type of UPS is used to supply power above 10kVA and provides an ideal electric output presentation, and its constant wear on the power components reduces the dependability?

Become a Premium Member for full access
  Unlock Premium Member

Question 466

Report Export Collapse

John has planned to update all Linux workstations in his network. The organization is using various Linux distributions including Red hat, Fedora and Debian.

Which of following commands will he use to update each respective Linux distribution?

Become a Premium Member for full access
  Unlock Premium Member

Question 467

Report Export Collapse

Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?

Become a Premium Member for full access
  Unlock Premium Member

Question 468

Report Export Collapse

A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a __________ identified which helps measure how risky an activity is.

Become a Premium Member for full access
  Unlock Premium Member

Question 469

Report Export Collapse

Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________ implementation of a VPN.

Become a Premium Member for full access
  Unlock Premium Member

Question 470

Report Export Collapse

Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions