ECCouncil 312-38 Practice Test - Questions Answers, Page 50

List of questions
Question 491

Which ofthe following is true regarding any attack surface?
Question 492

Which type of attack is used to hack an loT device and direct large amounts of network traffic toward a web server, resulting in overloading the server with connections and preventing any new connections?
Question 493

How is a "risk" represented?
Question 494

Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an_for legal advice to defend them against this allegation.
Question 495

An employee of a medical service company clicked a malicious link in an email sent by an attacker. Suddenly, employees ofthe company are not able to access billing information or client record as it is encrypted. The attacker asked the company to pay money for gaining access to their data. Which type of malware attack is described above?
Question 496

Sam, a network administrator, is using Wireshark to monitor the network traffic ofthe organization. He wants to detect TCP packets with no flag set to check for a specifi c attack attempt. Which filter will he use to view the traffic?
Question 497

Which ofthe following defines the extent to which an interruption affects normal business operations and the amount of revenue lost due to that interruption?
Question 498

Which command is used to change the permissi ons of a file or di rectory?
Question 499

John, a network administrator, is configuring Amazon EC2 cloud service for his organization. Identify the type of cloud service modules his organization adopted.
Question 500

Identify the type of event that is recorded when an application driver loads successfully in Windows.
Question