ECCouncil 312-38 Practice Test - Questions Answers, Page 49
List of questions
Question 481
DRAG DROP
George works as a Network Administrator for Blue Soft Inc. The company uses Windows Vista operating system. The network of the company is continuously connected to the Internet. What will George use to protect the network of the company from intrusion?
Select and Place:
Question 482
Which among the following is used to limitthe number of cmdlets or administrative privileges of administrator, user, or service accounts?
Question 483
How is application whitelisting different from application blacklisting?
Question 484
Which of the follow ng security models enable strict identity verification for every user or device attempting to access the network resources?
Question 485
If Myron, head of network defense at Cyberdyne, wants to change the default password policy settings on the company's Linux systems, which directory snould he access?
Question 486
Which of the Windows security component is responsible for controlling access of a user to Windows resources?
Question 487
A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access it at any time and from any location. What is the appropriate backup method that should be implemented?
Question 488
Which of the following helps in viewing account activity and events for supported services made by AWS?
Question 489
John is working as a network defender at a well-reputed multinational company. He wanted to implement security that can help him identify any future attacks that can be targeted toward his organiza:ion and take appropriate security measures and actions beforehand to defend against them. Which one of the following security defense techniques should be implement?
Question 490
Which type of firewall consists of three interfaces and allows further subdivision of the systems based on specific security objectives of the organization?
Question