ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 48

Question list
Search
Search

List of questions

Search

Related questions











Chris is a senior network administrator. Chris wants to measure the Key Risk Indicator (KRI) to assess the organization. Why is Chris calculating the KRI for his organization? It helps Chris to:

A.
Identifies adverse events
A.
Identifies adverse events
Answers
B.
Facilitates backward viewing
B.
Facilitates backward viewing
Answers
C.
Notifies when risk has reached threshold levels
C.
Notifies when risk has reached threshold levels
Answers
D.
Facilitates post incident management
D.
Facilitates post incident management
Answers
Suggested answer: C

Which Event Correlation Approach checks and compares all the fields systematically and intentionally for positive and negative correlation with each other to determine the correlation across one or multiple fields?

A.
Rule-Based Approach
A.
Rule-Based Approach
Answers
B.
Graph-Based Approach
B.
Graph-Based Approach
Answers
C.
Field-Based Approach
C.
Field-Based Approach
Answers
D.
Automated Field Correlation
D.
Automated Field Correlation
Answers
Suggested answer: D

Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this, Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What should the new employees answer?

A.
They should answer with the Presentation layer.
A.
They should answer with the Presentation layer.
Answers
B.
NICs work on the Session layer of the OSI model.
B.
NICs work on the Session layer of the OSI model.
Answers
C.
They should tell Bryson that NICs perform on the Physical layer.
C.
They should tell Bryson that NICs perform on the Physical layer.
Answers
D.
The new employees should say that NICs perform on the Network layer.
D.
The new employees should say that NICs perform on the Network layer.
Answers
Suggested answer: C

A US-based organization decided to implement a RAID storage technology for their data backup plan. John wants to setup a RAID level that requires a minimum of six drives but will meet high fault tolerance and with a high speed for the data read and write operations. What RAID level will John need to choose to meet this requirement?

A.
RAID level 50
A.
RAID level 50
Answers
B.
RAID level 1
B.
RAID level 1
Answers
C.
RAID level 10
C.
RAID level 10
Answers
D.
RAID level 5
D.
RAID level 5
Answers
Suggested answer: A

Ivan needs to pick an encryption method that is scalable even though it might be slower. He has settled on a method that works where one key is public and the other is private. What encryption method did Ivan settle on?

A.
Ivan settled on the hashing encryption method.
A.
Ivan settled on the hashing encryption method.
Answers
B.
Ivan settled on the asymmetric encryption method.
B.
Ivan settled on the asymmetric encryption method.
Answers
C.
Ivan settled on the private encryption method.
C.
Ivan settled on the private encryption method.
Answers
D.
Ivan settled on the symmetric encryption method.
D.
Ivan settled on the symmetric encryption method.
Answers
Suggested answer: B

Identify the spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code.

A.
ISM
A.
ISM
Answers
B.
FHSS
B.
FHSS
Answers
C.
DSSS
C.
DSSS
Answers
D.
OFDM
D.
OFDM
Answers
Suggested answer: C

Katie has implemented the RAID level that splits data into blocks and evenly writes the data to multiple hard drives but does not provide data redundancy. This type of RAID level requires a minimum of __________ in order to setup.

A.
Two drives
A.
Two drives
Answers
B.
Three drives
B.
Three drives
Answers
C.
Six drives
C.
Six drives
Answers
D.
Four drives
D.
Four drives
Answers
Suggested answer: A

Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. Which network topology will help the administrator solve the problem of needing to add new employees and expand?

A.
Mesh
A.
Mesh
Answers
B.
Ring
B.
Ring
Answers
C.
Bus
C.
Bus
Answers
D.
Star
D.
Star
Answers
Suggested answer: D

The agency Jacob works for stores and transmits vast amounts of sensitive government data that cannot be compromised. Jacob has implemented Encapsulating Security Payload (ESP) to encrypt IP traffic. Jacob wants to encrypt the IP traffic by inserting the ESP header in the IP datagram before the transport layer protocol header. What mode of ESP does Jacob need to use to encrypt the IP traffic?

A.
Jacob should use ESP in pass-through mode.
A.
Jacob should use ESP in pass-through mode.
Answers
B.
Jacob should utilize ESP in tunnel mode.
B.
Jacob should utilize ESP in tunnel mode.
Answers
C.
He should use ESP in gateway mode.
C.
He should use ESP in gateway mode.
Answers
D.
He should use ESP in transport mode.
D.
He should use ESP in transport mode.
Answers
Suggested answer: B

DRAG DROP

Drag and drop the terms to match with their descriptions.

Question 480
Correct answer: Question 480

Explanation:

Following are the terms with their descriptions:

A Trojan horse is a malicious software program that contains hidden code and masquerades itself as a normal program. When a Trojan horse program is run, its hidden code runs to destroy or scramble data on the hard disk. An example of a Trojan horse is a program that masquerades as a computer logon to retrieve user names and password information. The developer of a Trojan horse can use this information later to gain unauthorized access to computers. Trojan horses are normally spread by e-mail attachments. Ping sweep is a technique used to determine which of a range of IP addresses map to live hosts. It consists of ICMP ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. A ping is often used to check that a network device is functioning. To disable ping sweeps on a network, administrators can block ICMP ECHO requests from outside sources. However, ICMP TIMESTAMP and ICMP INFO can be used in a similar manner. Spamware is software designed by or for spammers to send out automated spam e-mail. Spamware is used to search for e-mail addresses to build lists of e-mail addresses to be used either for spamming directly or to be sold to spammers. The spamware package also includes an email harvesting tool. A backdoor is any program that allows a hacker to connect to a computer without going through the normal authentication process. The main advantage of this type of attack is that the network traffic moves from inside a network to the hacker's computer. The traffic moving from inside a network to the outside world is typically the least restrictive, as companies are more concerned about what comes into a network, rather than what leaves it. It, therefore, becomes hard to detect backdoors.

Total 613 questions
Go to page: of 62