ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 49

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

George works as a Network Administrator for Blue Soft Inc. The company uses Windows Vista operating system. The network of the company is continuously connected to the Internet. What will George use to protect the network of the company from intrusion?

Select and Place:


Question 481
Correct answer: Question 481

Which among the following is used to limitthe number of cmdlets or administrative privileges of administrator, user, or service accounts?

A.
Just Enough Administration (EA)
A.
Just Enough Administration (EA)
Answers
B.
User Account Control (UAC)
B.
User Account Control (UAC)
Answers
C.
Windows Security Identifier (SID)
C.
Windows Security Identifier (SID)
Answers
D.
Credential Guard
D.
Credential Guard
Answers
Suggested answer: A

How is application whitelisting different from application blacklisting?

A.
It allows all applications other than the undesirable applications
A.
It allows all applications other than the undesirable applications
Answers
B.
It allows execution of trusted applications in a unified environment
B.
It allows execution of trusted applications in a unified environment
Answers
C.
It allows execution of untrusted applications in an isolated environment
C.
It allows execution of untrusted applications in an isolated environment
Answers
D.
It rejects all applications other than the allowed applications
D.
It rejects all applications other than the allowed applications
Answers
Suggested answer: D

Which of the follow ng security models enable strict identity verification for every user or device attempting to access the network resources?

A.
Zero-trust network model II. Castle-and-Moat model
A.
Zero-trust network model II. Castle-and-Moat model
Answers
B.
Both I and II
B.
Both I and II
Answers
C.
I only
C.
I only
Answers
D.
II only
D.
II only
Answers
E.
None
E.
None
Answers
Suggested answer: B

If Myron, head of network defense at Cyberdyne, wants to change the default password policy settings on the company's Linux systems, which directory snould he access?

A.
/etc/logrotate.conf
A.
/etc/logrotate.conf
Answers
B.
/etc/hosts.allow
B.
/etc/hosts.allow
Answers
C.
/etc/crontab
C.
/etc/crontab
Answers
D.
/etc/loqin.defs
D.
/etc/loqin.defs
Answers
Suggested answer: D

Which of the Windows security component is responsible for controlling access of a user to Windows resources?

A.
Network Logon Service (Netlogon)
A.
Network Logon Service (Netlogon)
Answers
B.
Security Accounts Manager (SAM)
B.
Security Accounts Manager (SAM)
Answers
C.
Security Reference Monitor (SRM)
C.
Security Reference Monitor (SRM)
Answers
D.
Local Security Authority Subsystem (LSASS)
D.
Local Security Authority Subsystem (LSASS)
Answers
Suggested answer: D

A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access it at any time and from any location. What is the appropriate backup method that should be implemented?

A.
Cloud backup
A.
Cloud backup
Answers
B.
Offsite backup
B.
Offsite backup
Answers
C.
Hot site backup
C.
Hot site backup
Answers
D.
Onsite backup
D.
Onsite backup
Answers
Suggested answer: A

Which of the following helps in viewing account activity and events for supported services made by AWS?

A.
AWS CloudFomation
A.
AWS CloudFomation
Answers
B.
AWS Certificate Manager
B.
AWS Certificate Manager
Answers
C.
AWS CloudHSM
C.
AWS CloudHSM
Answers
D.
AWS CloudTrial
D.
AWS CloudTrial
Answers
Suggested answer: D

John is working as a network defender at a well-reputed multinational company. He wanted to implement security that can help him identify any future attacks that can be targeted toward his organiza:ion and take appropriate security measures and actions beforehand to defend against them. Which one of the following security defense techniques should be implement?

A.
Reactive security approach
A.
Reactive security approach
Answers
B.
Retrospective security approach
B.
Retrospective security approach
Answers
C.
Proactive security approach
C.
Proactive security approach
Answers
D.
Preventive security approach
D.
Preventive security approach
Answers
Suggested answer: C

Which type of firewall consists of three interfaces and allows further subdivision of the systems based on specific security objectives of the organization?

A.
Screened subnet
A.
Screened subnet
Answers
B.
Bastion host
B.
Bastion host
Answers
C.
Unscreened subnet
C.
Unscreened subnet
Answers
D.
Multi-homed firewall
D.
Multi-homed firewall
Answers
Suggested answer: D
Total 613 questions
Go to page: of 62