ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 53

Question list
Search
Search

List of questions

Search

Related questions











In________mechanism, the system or application sends log records either on the local disk or over the network.

A.
Network-based
A.
Network-based
Answers
B.
Pull-based
B.
Pull-based
Answers
C.
Push-based
C.
Push-based
Answers
D.
Host-based
D.
Host-based
Answers
Suggested answer: C

Choose the correct order of steps to analyze the attack surface.

A.
Identify the indicators of exposure->visualize the attack surface->simulate the attack->reduce the attack surface
A.
Identify the indicators of exposure->visualize the attack surface->simulate the attack->reduce the attack surface
Answers
B.
Visualize the attack surface->simulate the attack-identify the indicators of expos ure->reduce the attack surface
B.
Visualize the attack surface->simulate the attack-identify the indicators of expos ure->reduce the attack surface
Answers
C.
Identify the indicators of exposure->simulate the attack->visialize the attack surfaces reduce the attack surface
C.
Identify the indicators of exposure->simulate the attack->visialize the attack surfaces reduce the attack surface
Answers
D.
Visualize the attack surface->identify the indicators of exposure->simulate the attack->reduce the attack surface
D.
Visualize the attack surface->identify the indicators of exposure->simulate the attack->reduce the attack surface
Answers
Suggested answer: D

Leslie, the network administrator of Livewire Technologies, has been recommending multilayer inspection firewalls to deploy the company's infrastructure. What layers of the TCP/IP model can it pro:ect?

A.
IP, application, and network interface
A.
IP, application, and network interface
Answers
B.
Network i nterface, TCP, and IP
B.
Network i nterface, TCP, and IP
Answers
C.
Application,TCP, and IP
C.
Application,TCP, and IP
Answers
D.
Application, IP, and network interface
D.
Application, IP, and network interface
Answers
Suggested answer: D

To provide optimum security while enabling safe/necessary services, blocking known dangerous services, and making employees accountable for their online activity, what Internet Access policy would Brian, the network administrator, have to choose?

A.
Prudent policy
A.
Prudent policy
Answers
B.
Paranoid policy
B.
Paranoid policy
Answers
C.
Promiscuous policy
C.
Promiscuous policy
Answers
D.
Permissive policy
D.
Permissive policy
Answers
Suggested answer: A

Which command list all ports available on a server?

A.
sudo apt nst -tunlp
A.
sudo apt nst -tunlp
Answers
B.
sudo netstat -tunlp
B.
sudo netstat -tunlp
Answers
C.
sudo apt netstate -Is tunlp
C.
sudo apt netstate -Is tunlp
Answers
D.
sudo ntstat -Is tunlp
D.
sudo ntstat -Is tunlp
Answers
Suggested answer: B

Which BC/DR activity works on the assumption that the most critical processes are brought back from a remote location first, followed by the less critical functions?

A.
Recovery
A.
Recovery
Answers
B.
Restoration
B.
Restoration
Answers
C.
Response
C.
Response
Answers
D.
Resumption
D.
Resumption
Answers
Suggested answer: A

Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the script execution policy. He wants to allow the execution of the scripts that are signed by a trusted publisher. Which ofthe following script execution policy setting this?

A.
AllSigned
A.
AllSigned
Answers
B.
Restricted
B.
Restricted
Answers
C.
RemoteSigned
C.
RemoteSigned
Answers
D.
Unrestricted
D.
Unrestricted
Answers
Suggested answer: A

Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several Linux systems, which causes machines to hang every 1 hour. Fargo would like to eliminate it; what command should he execute?

A.
# update-rc.d -f [service name] remove
A.
# update-rc.d -f [service name] remove
Answers
B.
# service [service name] stop
B.
# service [service name] stop
Answers
C.
# ps ax | grep [Target Process]
C.
# ps ax | grep [Target Process]
Answers
D.
# kill -9 [PID]
D.
# kill -9 [PID]
Answers
Suggested answer: D

Which of the following refers to the data that is stored or processed by RAM, CPUs, or databases?

A.
Data in Backup
A.
Data in Backup
Answers
B.
Data at Rest
B.
Data at Rest
Answers
C.
Data in Transit
C.
Data in Transit
Answers
D.
Data is Use
D.
Data is Use
Answers
Suggested answer: B

Which of the follow ng data security technology can ensure information protection by obscuring specific areas of information?

A.
Data retention
A.
Data retention
Answers
B.
Data encryption
B.
Data encryption
Answers
C.
Data hashing
C.
Data hashing
Answers
D.
Data masking
D.
Data masking
Answers
Suggested answer: D
Total 613 questions
Go to page: of 62