ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 50

Question list
Search
Search

List of questions

Search

Related questions











Which ofthe following is true regarding any attack surface?

A.
Decrease in vulnerabilities decreases the attack surface
A.
Decrease in vulnerabilities decreases the attack surface
Answers
B.
Increase in vulnerabilities decreases the attack surface
B.
Increase in vulnerabilities decreases the attack surface
Answers
C.
Decrease in risk exposures increases the attack surface
C.
Decrease in risk exposures increases the attack surface
Answers
D.
Decrease in vulnerabilities increases the attack surface
D.
Decrease in vulnerabilities increases the attack surface
Answers
Suggested answer: A

Which type of attack is used to hack an loT device and direct large amounts of network traffic toward a web server, resulting in overloading the server with connections and preventing any new connections?

A.
XSS
A.
XSS
Answers
B.
DDoS
B.
DDoS
Answers
C.
XCRF
C.
XCRF
Answers
D.
Sniffing
D.
Sniffing
Answers
Suggested answer: B

How is a "risk" represented?

A.
Asset + threat
A.
Asset + threat
Answers
B.
Motive (goal) + method
B.
Motive (goal) + method
Answers
C.
Asset + threat + vulnerability
C.
Asset + threat + vulnerability
Answers
D.
Motive (goal) + method + vulnerability
D.
Motive (goal) + method + vulnerability
Answers
Suggested answer: C

Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an_for legal advice to defend them against this allegation.

A.
Evidence Manager
A.
Evidence Manager
Answers
B.
Incident Handler
B.
Incident Handler
Answers
C.
Attorney
C.
Attorney
Answers
D.
PR Specialist
D.
PR Specialist
Answers
Suggested answer: C

An employee of a medical service company clicked a malicious link in an email sent by an attacker. Suddenly, employees ofthe company are not able to access billing information or client record as it is encrypted. The attacker asked the company to pay money for gaining access to their data. Which type of malware attack is described above?

A.
Logic bomb
A.
Logic bomb
Answers
B.
Rootkits
B.
Rootkits
Answers
C.
Trojan
C.
Trojan
Answers
D.
Ransomware
D.
Ransomware
Answers
Suggested answer: D

Sam, a network administrator, is using Wireshark to monitor the network traffic ofthe organization. He wants to detect TCP packets with no flag set to check for a specifi c attack attempt. Which filter will he use to view the traffic?

A.
tcp.flags==0x000
A.
tcp.flags==0x000
Answers
B.
tcp.flags==x0000
B.
tcp.flags==x0000
Answers
C.
tcp.flags==000x0
C.
tcp.flags==000x0
Answers
D.
tcp.flags==0000x
D.
tcp.flags==0000x
Answers
Suggested answer: A

Which ofthe following defines the extent to which an interruption affects normal business operations and the amount of revenue lost due to that interruption?

A.
RPO
A.
RPO
Answers
B.
RFO
B.
RFO
Answers
C.
RSP
C.
RSP
Answers
D.
RTO
D.
RTO
Answers
Suggested answer: D

Which command is used to change the permissi ons of a file or di rectory?

A.
rmdir
A.
rmdir
Answers
B.
systemctl
B.
systemctl
Answers
C.
kill
C.
kill
Answers
D.
chmod
D.
chmod
Answers
Suggested answer: D

John, a network administrator, is configuring Amazon EC2 cloud service for his organization. Identify the type of cloud service modules his organization adopted.

A.
Software-as-a-Service(SaaS)
A.
Software-as-a-Service(SaaS)
Answers
B.
Infrastructure-as-a-Service (laaS)
B.
Infrastructure-as-a-Service (laaS)
Answers
C.
Platform-as-a-Service(PaaS)
C.
Platform-as-a-Service(PaaS)
Answers
D.
Storage-as-a-Service(SaaS)
D.
Storage-as-a-Service(SaaS)
Answers
Suggested answer: B

Identify the type of event that is recorded when an application driver loads successfully in Windows.

A.
Success Audit
A.
Success Audit
Answers
B.
Error
B.
Error
Answers
C.
Warning
C.
Warning
Answers
D.
Information
D.
Information
Answers
Suggested answer: D
Total 613 questions
Go to page: of 62