ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 54

Question list
Search
Search

List of questions

Search

Related questions











Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which itis running and communicates with the host machinesfor requesting resources. Identify the virtualization technique implemented by Elden's organization.

A.
Hybrid virtualization
A.
Hybrid virtualization
Answers
B.
Hardware-assisted virtualization
B.
Hardware-assisted virtualization
Answers
C.
Full virtualization
C.
Full virtualization
Answers
D.
Para virtualization
D.
Para virtualization
Answers
Suggested answer: B

Albert works as a Windows system administrator at an MNC. He uses PowerShell logging to identify any suspicious scripting activity across the network. He wants to record pipeline execution details as PowerShell executes, including variable initialization and command invocations. Which PowerShell logging component records pipeline execution details as PowerShell executes?

A.
Module logging
A.
Module logging
Answers
B.
Script block logging
B.
Script block logging
Answers
C.
Event logging
C.
Event logging
Answers
D.
Transcript logging
D.
Transcript logging
Answers
Suggested answer: A

How can one identify the baseline for normal traffic?

A.
When the SYN flag appears at the beginning and the FIN flag appears at the end of the connection
A.
When the SYN flag appears at the beginning and the FIN flag appears at the end of the connection
Answers
B.
When the RST flag appears at the beginning and the ACK flag appears atthe end of the connection
B.
When the RST flag appears at the beginning and the ACK flag appears atthe end of the connection
Answers
C.
When the ACK flag appears atthe beginning and the RST flag appears atthe end of the connection
C.
When the ACK flag appears atthe beginning and the RST flag appears atthe end of the connection
Answers
D.
When the FIN flag appears at the beginning and the SYN flag appears at the end ofthe connection
D.
When the FIN flag appears at the beginning and the SYN flag appears at the end ofthe connection
Answers
Suggested answer: A

Sophie has been working as a Windows network administrator at an MNC over the past 7 years. She wants to check whether SMB1 is enabled or disabled.

Which ofthe following command allows Scphie to do so?

A.
Get-WindowsOptionalFeatures -Online -FeatureNames SMB1 Protocol
A.
Get-WindowsOptionalFeatures -Online -FeatureNames SMB1 Protocol
Answers
B.
Get-WindowsOptionalFeature -Online -FeatureName SMB1 Protocol
B.
Get-WindowsOptionalFeature -Online -FeatureName SMB1 Protocol
Answers
C.
Get-WindowsOptionalFeature -Online -FeatureNames SMB1 Protocol
C.
Get-WindowsOptionalFeature -Online -FeatureNames SMB1 Protocol
Answers
D.
Get-WindowsOptionalFeatures -Online -FeatureName SMB1 Proto col
D.
Get-WindowsOptionalFeatures -Online -FeatureName SMB1 Proto col
Answers
Suggested answer: B

How is an "attack" represented?

A.
Motive (goal) + method
A.
Motive (goal) + method
Answers
B.
Motive (goal) + method + vulnerability
B.
Motive (goal) + method + vulnerability
Answers
C.
Asset + Threat - Vulnerability
C.
Asset + Threat - Vulnerability
Answers
D.
Asset + Threat
D.
Asset + Threat
Answers
Suggested answer: A

Kelly is taking backups of the organization's data. Currently, she is taking backups of only those files that are created or modified after the last backup. What type of backup is Kelly using?

A.
Full backup
A.
Full backup
Answers
B.
Incremental backup
B.
Incremental backup
Answers
C.
Normal backup
C.
Normal backup
Answers
D.
Differential backup
D.
Differential backup
Answers
Suggested answer: D

Identify the virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware.

A.
Fabric virtualization
A.
Fabric virtualization
Answers
B.
Storage device virtualization
B.
Storage device virtualization
Answers
C.
Server virtualization
C.
Server virtualization
Answers
D.
File system virtualization
D.
File system virtualization
Answers
Suggested answer: B

Sam wants to implement a network-based IDS and finalizes an IDS solution that works based on pattern matching. Which type of network-based IDS is Sam implementing?

A.
Behavior-based IDS
A.
Behavior-based IDS
Answers
B.
Anomaly-based IDS
B.
Anomaly-based IDS
Answers
C.
Signature-based IDS
C.
Signature-based IDS
Answers
D.
Stateful protocol analysis
D.
Stateful protocol analysis
Answers
Suggested answer: C

Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in the system, which can be exploited by the attackers.

Which among the following is the correct syntax for disabling a service?

A.
$ sudo system-ctl disable [servicel
A.
$ sudo system-ctl disable [servicel
Answers
B.
$ sudo systemctl disable [service]
B.
$ sudo systemctl disable [service]
Answers
C.
$ sudo system.dl disable [service]
C.
$ sudo system.dl disable [service]
Answers
D.
$ sudo system dl disable [service]
D.
$ sudo system dl disable [service]
Answers
Suggested answer: B

Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the company can deny getting email notifications or any ether communication, she mandates authentication before a connection establishment or message transfer occurs. What fundamental attribute of network defense is she enforcing?

A.
Integrity
A.
Integrity
Answers
B.
Non-repudiation
B.
Non-repudiation
Answers
C.
Confidentiality
C.
Confidentiality
Answers
D.
Authentication
D.
Authentication
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62