ECCouncil 312-38 Practice Test - Questions Answers, Page 52
List of questions
Question 511
John is a senior network security administrator working at a multinational company. He wants to block specif c sys calls from being used by container binaries.
Which Linux kernel feature restricts actions within the container?
Question 512
Which ofthe follow ng is not part ofthe recommended first response steps for network defenders?
Question 513
Which among the following tools can help in identifying loEs to evaluate human attack surface?
Question 514
Iri______method, event lugs are arranged in the fuim of a circular buffer.
Question 515
Which of the follow ng indicators refers to potential risk exposures that attackers can use to breach the security of an organization?
Question 516
Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?
Question 517
Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?
Question 518
Who is an IR custodian?
Question 519
Which of the follow ng attack surface increase when you keep USB ports enabled on your laptop unnecessarily?
Question 520
Which among the following filter is used to detect a SYN/FIN attack?
Question