ECCouncil 312-38 Practice Test - Questions Answers, Page 54
List of questions
Question 531

Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which itis running and communicates with the host machinesfor requesting resources. Identify the virtualization technique implemented by Elden's organization.
Question 532

Albert works as a Windows system administrator at an MNC. He uses PowerShell logging to identify any suspicious scripting activity across the network. He wants to record pipeline execution details as PowerShell executes, including variable initialization and command invocations. Which PowerShell logging component records pipeline execution details as PowerShell executes?
Question 533

How can one identify the baseline for normal traffic?
Question 534

Sophie has been working as a Windows network administrator at an MNC over the past 7 years. She wants to check whether SMB1 is enabled or disabled.
Which ofthe following command allows Scphie to do so?
Question 535

How is an "attack" represented?
Question 536

Kelly is taking backups of the organization's data. Currently, she is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?
Question 537

Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.
Question 538

Sam wants to implement a network-based IDS and finalizes an IDS solution that works based on pattern matching. Which type of network-based IDS is Sam implementing?
Question 539

Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in the system, which can be exploited by the attackers.
Which among the following is the correct syntax for disabling a service?
Question 540

Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any ether communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?
Question