ECCouncil 312-38 Practice Test - Questions Answers, Page 55
List of questions
Related questions
Which of the following refers to a potential occurrence of an undesired event that can eventually damage and interrupt the operational and functional activities of an organization?
Damian is the chief security officer of Enigma Electronics. To block intruders and prevent any environmental accidents, he needs to set a two-factor authenticated keypad lock at the entrance, rig a fire suppression system, and link any video cameras at various corridors to view the feeds in the surveillance room. What layer of network defense-in-depth strategy is he trying to follow?
Which of the following statement holds true in terms of containers?
Byron, a new network administrator at FBI, would like to ensure that Windows PCs there are up-to-date and have less internal security flaws. What can he do?
Which of the following entities is responsible for cloud security?
Which subdirectory in /var/log directory stores information related to Apache web server?
The _________ mechanism works on the basis of a client-server model.
Which BC/DR activity includes action taken toward resuming all services that are dependent on business-critical applications?
Peter works as a network administrator at an IT company. He wants to avoid exploitation of the cloud, particularly Azure services. Which of the following is a group of PowerShell scripts designed to help the network administrator understand how attacks happen and help them protect the cloud?
Syslog and SNMP are the two main_______protocols through which log records are transferred.
Question