ECCouncil 312-38 Practice Test - Questions Answers, Page 52
List of questions
Question 511

John is a senior network security administrator working at a multinational company. He wants to block specif c sys calls from being used by container binaries.
Which Linux kernel feature restricts actions within the container?
Question 512

Which ofthe follow ng is not part ofthe recommended first response steps for network defenders?
Question 513

Which among the following tools can help in identifying loEs to evaluate human attack surface?
Question 514

Iri______method, event lugs are arranged in the fuim of a circular buffer.
Question 515

Which of the follow ng indicators refers to potential risk exposures that attackers can use to breach the security of an organization?
Question 516

Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
Question 517

Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?
Question 518

Who is an IR custodian?
Question 519

Which of the follow ng attack surface increase when you keep USB ports enabled on your laptop unnecessarily?
Question 520

Which among the following filter is used to detect a SYN/FIN attack?
Question