ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 56

Question list
Search
Search

Related questions











If an organization has decided to consume PaaS Cloud service model, then identify the organization's responsibility that they need to look after based on shared responsibility model.

A.
Data, interfaces, application, etc.
A.
Data, interfaces, application, etc.
Answers
B.
Data, interfaces, application, middleware, OS, VM, virtual network, etc.
B.
Data, interfaces, application, middleware, OS, VM, virtual network, etc.
Answers
C.
Data, interfaces, application, middleware, OS, VM, virtual network, hypervisors, processing and memory, data storage, network interfaces, facilities and data centers, etc.
C.
Data, interfaces, application, middleware, OS, VM, virtual network, hypervisors, processing and memory, data storage, network interfaces, facilities and data centers, etc.
Answers
D.
Data, interfaces, etc.
D.
Data, interfaces, etc.
Answers
Suggested answer: A

Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?

A.
Shared Responsibility Model for Container Services
A.
Shared Responsibility Model for Container Services
Answers
B.
Shared Responsibility Model for Infrastructure Services
B.
Shared Responsibility Model for Infrastructure Services
Answers
C.
Shared Responsibility Model for Abstract Services
C.
Shared Responsibility Model for Abstract Services
Answers
D.
Shared Responsibility Model for Storage Services
D.
Shared Responsibility Model for Storage Services
Answers
Suggested answer: D

Docker provides Patform-as-a-Service (PaaS) through___________and delivers containerized software packages.

A.
Server-level virtualization
A.
Server-level virtualization
Answers
B.
Network-level virtualization
B.
Network-level virtualization
Answers
C.
OS-level virtualization
C.
OS-level virtualization
Answers
D.
Storage-level visualization
D.
Storage-level visualization
Answers
Suggested answer: C

Mark is monitoring the network traffic on his organization's network. He wants to detect TCP and UDP ping sweeps on his network. Which type of filter will be used to detect this?

A.
tcp.dstport==7 and udp.srcport==7
A.
tcp.dstport==7 and udp.srcport==7
Answers
B.
tcp.srcport==7 and udp.dstport==7
B.
tcp.srcport==7 and udp.dstport==7
Answers
C.
tcp.dstport==7 and udp.dstport==7
C.
tcp.dstport==7 and udp.dstport==7
Answers
D.
tcp.srcport==7 and udp.srcport==7
D.
tcp.srcport==7 and udp.srcport==7
Answers
Suggested answer: C

John has implemented__________in the network to restrict the number of public IP addresses in his organization and to enhance the firewall filtering technique.

A.
VPN
A.
VPN
Answers
B.
Proxies
B.
Proxies
Answers
C.
DMZ
C.
DMZ
Answers
D.
NAT
D.
NAT
Answers
Suggested answer: D

Which ofthe following creates passwords for individual adminisiator accounts and stores them in Windows AD?

A.
LSASS
A.
LSASS
Answers
B.
SRM
B.
SRM
Answers
C.
SAM
C.
SAM
Answers
D.
LAPS
D.
LAPS
Answers
Suggested answer: C

Which ofthe following statements holds true in terms of virtual machines?

A.
Hardware-level virtualization takes place in VMs
A.
Hardware-level virtualization takes place in VMs
Answers
B.
OS-level virtualization takes place in VMs
B.
OS-level virtualization takes place in VMs
Answers
C.
All VMs share the host OS
C.
All VMs share the host OS
Answers
D.
VMs are light weight than containers
D.
VMs are light weight than containers
Answers
Suggested answer: A

In MacOS, how can the user implement disk encryption?

A.
By enabling BitLocker feature
A.
By enabling BitLocker feature
Answers
B.
By executing dm-crypt command
B.
By executing dm-crypt command
Answers
C.
By turning on Device Encryption feature
C.
By turning on Device Encryption feature
Answers
D.
By enabling FileVault feature
D.
By enabling FileVault feature
Answers
Suggested answer: D

Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:

A.
Cloud to service attack surface
A.
Cloud to service attack surface
Answers
B.
User to service attack surface
B.
User to service attack surface
Answers
C.
User to cloud attack surface
C.
User to cloud attack surface
Answers
D.
Cloud to user attack surface
D.
Cloud to user attack surface
Answers
Suggested answer: D

Disaster Recovery is a

A.
Operation-centric strategy
A.
Operation-centric strategy
Answers
B.
Security-centric strategy
B.
Security-centric strategy
Answers
C.
Data-centric strategy
C.
Data-centric strategy
Answers
D.
Business-centric strategy
D.
Business-centric strategy
Answers
Suggested answer: C
Total 613 questions
Go to page: of 62