ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 52

Question list
Search
Search

Related questions











John is a senior network security administrator working at a multinational company. He wants to block specif c sys calls from being used by container binaries.

Which Linux kernel feature restricts actions within the container?

A.
Cgroups
A.
Cgroups
Answers
B.
LSMs
B.
LSMs
Answers
C.
Seccomp
C.
Seccomp
Answers
D.
Usems
D.
Usems
Answers
Suggested answer: C

Which ofthe follow ng is not part ofthe recommended first response steps for network defenders?

A.
Restrict yours elf from doing the investigation
A.
Restrict yours elf from doing the investigation
Answers
B.
Extract relevant data from the suspected devices as early as possible
B.
Extract relevant data from the suspected devices as early as possible
Answers
C.
Disable virus protection
C.
Disable virus protection
Answers
D.
Do not change the state ofthe suspected device
D.
Do not change the state ofthe suspected device
Answers
Suggested answer: D

Which among the following tools can help in identifying loEs to evaluate human attack surface?

A.
securiCAD
A.
securiCAD
Answers
B.
Amass
B.
Amass
Answers
C.
Skybox
C.
Skybox
Answers
D.
SET
D.
SET
Answers
Suggested answer: A

Iri______method, event lugs are arranged in the fuim of a circular buffer.

A.
Non-wrapping method
A.
Non-wrapping method
Answers
B.
LIFO method
B.
LIFO method
Answers
C.
Wrapping method
C.
Wrapping method
Answers
D.
FIFO method
D.
FIFO method
Answers
Suggested answer: D

Which of the follow ng indicators refers to potential risk exposures that attackers can use to breach the security of an organization?

A.
Indicators of attack
A.
Indicators of attack
Answers
B.
Key risk indicators
B.
Key risk indicators
Answers
C.
Indicators of exposure
C.
Indicators of exposure
Answers
D.
Indicators of compromise
D.
Indicators of compromise
Answers
Suggested answer: C

Which of the following can be used to disallow a system/user from accessing all applications except a specific folder on a system?

A.
Hash rule
A.
Hash rule
Answers
B.
Path rule
B.
Path rule
Answers
C.
Internet zone rule
C.
Internet zone rule
Answers
D.
Certificate rule
D.
Certificate rule
Answers
Suggested answer: A

Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?

A.
Application sandboxing
A.
Application sandboxing
Answers
B.
Deployment of WAFS
B.
Deployment of WAFS
Answers
C.
Application whitelisting
C.
Application whitelisting
Answers
D.
Application blacklisting
D.
Application blacklisting
Answers
Suggested answer: A

Who is an IR custodian?

A.
An individual responsible for conveying company details after an incident
A.
An individual responsible for conveying company details after an incident
Answers
B.
An individual who receives the initial IR alerts and leads the IR team in all the IR activities
B.
An individual who receives the initial IR alerts and leads the IR team in all the IR activities
Answers
C.
An individual who makes a decision on the classifications and the severity of the incident identified
C.
An individual who makes a decision on the classifications and the severity of the incident identified
Answers
D.
An individual responsible for the remediation and resolution of the incident that occurred
D.
An individual responsible for the remediation and resolution of the incident that occurred
Answers
Suggested answer: B

Which of the follow ng attack surface increase when you keep USB ports enabled on your laptop unnecessarily?

A.
Human attack surface
A.
Human attack surface
Answers
B.
Network attack surface
B.
Network attack surface
Answers
C.
Physical attack surface
C.
Physical attack surface
Answers
D.
Software attack surface
D.
Software attack surface
Answers
Suggested answer: C

Which among the following filter is used to detect a SYN/FIN attack?

A.
tcp.flags==0x002
A.
tcp.flags==0x002
Answers
B.
tcp.flags==0x004
B.
tcp.flags==0x004
Answers
C.
tcp.flags==0x003
C.
tcp.flags==0x003
Answers
D.
tcp.flags==0x001
D.
tcp.flags==0x001
Answers
Suggested answer: D
Total 613 questions
Go to page: of 62