ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 55

Question list
Search
Search

Related questions











Which of the following refers to a potential occurrence of an undesired event that can eventually damage and interrupt the operational and functional activities of an organization?

A.
Attack
A.
Attack
Answers
B.
Risk
B.
Risk
Answers
C.
Threat
C.
Threat
Answers
D.
Vulnerability
D.
Vulnerability
Answers
Suggested answer: C

Damian is the chief security officer of Enigma Electronics. To block intruders and prevent any environmental accidents, he needs to set a two-factor authenticated keypad lock at the entrance, rig a fire suppression system, and link any video cameras at various corridors to view the feeds in the surveillance room. What layer of network defense-in-depth strategy is he trying to follow?

A.
Physical
A.
Physical
Answers
B.
Perimeter
B.
Perimeter
Answers
C.
Policies and procedures
C.
Policies and procedures
Answers
D.
Host
D.
Host
Answers
Suggested answer: A

Which of the following statement holds true in terms of containers?

A.
Container requires more memory space
A.
Container requires more memory space
Answers
B.
Each container runs in its own OS
B.
Each container runs in its own OS
Answers
C.
Container is fully isolated; hence, more secure
C.
Container is fully isolated; hence, more secure
Answers
D.
Process-level isolation happens; a container in hence less secure
D.
Process-level isolation happens; a container in hence less secure
Answers
Suggested answer: D

Byron, a new network administrator at FBI, would like to ensure that Windows PCs there are up-to-date and have less internal security flaws. What can he do?

A.
Centrally assign Windows PC group policies
A.
Centrally assign Windows PC group policies
Answers
B.
Dedicate a partition on HDD and format the disk using NTFS
B.
Dedicate a partition on HDD and format the disk using NTFS
Answers
C.
Download and install latest patches and enable Windows Automatic Updates
C.
Download and install latest patches and enable Windows Automatic Updates
Answers
D.
Install antivirus software and turn off unnecessary services
D.
Install antivirus software and turn off unnecessary services
Answers
Suggested answer: D

Which of the following entities is responsible for cloud security?

A.
Cloud consumer
A.
Cloud consumer
Answers
B.
Cloud provider
B.
Cloud provider
Answers
C.
Both cloud consumer and provider
C.
Both cloud consumer and provider
Answers
D.
Cloud broker
D.
Cloud broker
Answers
Suggested answer: C

Which subdirectory in /var/log directory stores information related to Apache web server?

A.
/var/log/maillog/
A.
/var/log/maillog/
Answers
B.
/var/log/httpd/
B.
/var/log/httpd/
Answers
C.
/var/log/apachelog/
C.
/var/log/apachelog/
Answers
D.
/var/log/lighttpd/
D.
/var/log/lighttpd/
Answers
Suggested answer: B

The _________ mechanism works on the basis of a client-server model.

A.
Push-based
A.
Push-based
Answers
B.
Host-based
B.
Host-based
Answers
C.
Pull-based
C.
Pull-based
Answers
D.
Network-based
D.
Network-based
Answers
Suggested answer: C

Which BC/DR activity includes action taken toward resuming all services that are dependent on business-critical applications?

A.
Response
A.
Response
Answers
B.
Recovery
B.
Recovery
Answers
C.
Resumption
C.
Resumption
Answers
D.
Restoration
D.
Restoration
Answers
Suggested answer: B

Peter works as a network administrator at an IT company. He wants to avoid exploitation of the cloud, particularly Azure services. Which of the following is a group of PowerShell scripts designed to help the network administrator understand how attacks happen and help them protect the cloud?

A.
POSH-Sysmon
A.
POSH-Sysmon
Answers
B.
MicroBurst
B.
MicroBurst
Answers
C.
SecurityPolicyDsc
C.
SecurityPolicyDsc
Answers
D.
Sysmon
D.
Sysmon
Answers
Suggested answer: B

Syslog and SNMP are the two main_______protocols through which log records are transferred.

A.
Pull-based
A.
Pull-based
Answers
B.
Push-based
B.
Push-based
Answers
C.
Host-based
C.
Host-based
Answers
D.
Network-based
D.
Network-based
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62