ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 51

Question list
Search
Search

List of questions

Search

Related questions











Based on which ofthe following registry key, the Windows Event log audit configurations are recorded?

A.
HKEY LOCAL MACHINE\SYSTEM\Services\EventLog\ < ErrDev>
A.
HKEY LOCAL MACHINE\SYSTEM\Services\EventLog\ < ErrDev>
Answers
B.
HKEY LOCAL MACHINE\SYSTEM\CurrentControlSet\EventLog\ < EntAppsvc >
B.
HKEY LOCAL MACHINE\SYSTEM\CurrentControlSet\EventLog\ < EntAppsvc >
Answers
C.
HKEY_LOCAL_MACHINE\CurrentControlSet\Services\EveniLog\< ESENT >
C.
HKEY_LOCAL_MACHINE\CurrentControlSet\Services\EveniLog\< ESENT >
Answers
D.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\ < Event Log >
D.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\ < Event Log >
Answers
Suggested answer:

Richard has been working as a Linux system administrator at an MNC. He wants to maintain a productive and secure environment by improving the performance of the systems through Linux patch management. Richard is using Ubuntu and wants to patch the Linux systems manually. Which among the following command installs updates (new ones) for Debian-based Linux OSes?

A.
sudo apt-get upgrade
A.
sudo apt-get upgrade
Answers
B.
sudo apt-get dist-update
B.
sudo apt-get dist-update
Answers
C.
sudo apt-get dis:-upgrade
C.
sudo apt-get dis:-upgrade
Answers
D.
sudo apt-get update
D.
sudo apt-get update
Answers
Suggested answer: C

Which ofthe follow ng connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?

A.
Southbound AP
A.
Southbound AP
Answers
B.
Eastbound API
B.
Eastbound API
Answers
C.
Westbound API
C.
Westbound API
Answers
D.
Northbound API
D.
Northbound API
Answers
Suggested answer: A

Henry, head of network security at Gentech, has discovered a general report template that someone has reserved only for the CEO. Since the file has to be editable, viewable, and deletable by everyone, what permission value should he set?

A.
700
A.
700
Answers
B.
777
B.
777
Answers
C.
755
C.
755
Answers
D.
600
D.
600
Answers
Suggested answer: B

Which of the following provides a set of voluntary recommended cyber security features to include in network-capable loT devices?

A.
FGMA
A.
FGMA
Answers
B.
GLBA
B.
GLBA
Answers
C.
GCMA
C.
GCMA
Answers
D.
NIST
D.
NIST
Answers
Suggested answer: D

Which ofthe following is an example of MAC model?

A.
Chinese Waterfall model
A.
Chinese Waterfall model
Answers
B.
Clark-Beason integrity model
B.
Clark-Beason integrity model
Answers
C.
Access control matrix model
C.
Access control matrix model
Answers
D.
Bell-LaPadula model
D.
Bell-LaPadula model
Answers
Suggested answer: A

How can a WAF validate traffic before it reaches a web application?

A.
It uses a role-based filtering technigue
A.
It uses a role-based filtering technigue
Answers
B.
It uses an access-based filtering technigue
B.
It uses an access-based filtering technigue
Answers
C.
It uses a sandboxing filtering technique
C.
It uses a sandboxing filtering technique
Answers
D.
It uses a rule-based filtering technique
D.
It uses a rule-based filtering technique
Answers
Suggested answer: D

Jason has set a firewall policy that allows only a specific list of network services and denies everything else. This strategy is known as a_.

A.
Default allow
A.
Default allow
Answers
B.
Default access
B.
Default access
Answers
C.
Default accept
C.
Default accept
Answers
D.
Default deny
D.
Default deny
Answers
Suggested answer: D

Management asked Adam to implement a system allowing employees to use the same credentials to access multiple applications. Adam should implement the_____authentication technique to satisfy the request.

A.
Single-sign-on
A.
Single-sign-on
Answers
B.
Smart card authentication
B.
Smart card authentication
Answers
C.
Two-factor authentication
C.
Two-factor authentication
Answers
D.
Biometric
D.
Biometric
Answers
Suggested answer: A

Which ofthe follow ng things need to be identified during attack surface visualization?

A.
Attacker's tools, techniques, and procedures
A.
Attacker's tools, techniques, and procedures
Answers
B.
Authentication, authorization, and auditing in networks
B.
Authentication, authorization, and auditing in networks
Answers
C.
Regulatory frameworks, standards and, procedures for organizations
C.
Regulatory frameworks, standards and, procedures for organizations
Answers
D.
Assets, topologies, and policies ofthe organization
D.
Assets, topologies, and policies ofthe organization
Answers
Suggested answer: A
Total 613 questions
Go to page: of 62