ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Related questions











The CEO of Max Rager wants to send a confidential message regarding the new formula for its coveted soft drink, SuperMax, to its manufacturer in Texas.

However, he fears the message could be altered in transit. How can he prevent this incident from happening and what element of the message ensures the success of this method?

A.
Hashing; hash code
A.
Hashing; hash code
Answers
B.
Symmetric encryption; secret key
B.
Symmetric encryption; secret key
Answers
C.
Hashing; public key
C.
Hashing; public key
Answers
D.
Asymmetric encryption; public key
D.
Asymmetric encryption; public key
Answers
Suggested answer: A

Explanation:


Who offers formal experienced testimony in court?

A.
Incident analyzer
A.
Incident analyzer
Answers
B.
Evidence documenter
B.
Evidence documenter
Answers
C.
Expert witness
C.
Expert witness
Answers
D.
Attorney
D.
Attorney
Answers
Suggested answer: C

Which firewall technology can filler application-specific commands such as CET and POST requests?

A.
Circuit-level gateways
A.
Circuit-level gateways
Answers
B.
Application-level gateways
B.
Application-level gateways
Answers
C.
Application proxy
C.
Application proxy
Answers
D.
Stateful multi-layer inspection
D.
Stateful multi-layer inspection
Answers
Suggested answer: C

Hacktivists are threat actors, who can be described as -------------------

A.
People motivated by religious beliefs
A.
People motivated by religious beliefs
Answers
B.
Disgruntled/terminated employees
B.
Disgruntled/terminated employees
Answers
C.
People motivated by monetary gams
C.
People motivated by monetary gams
Answers
D.
People having political or social agenda
D.
People having political or social agenda
Answers
Suggested answer: D

Which RAID level system provides very good data performance but does not offer fault tolerance and data redundancy?

A.
PAID level 3
A.
PAID level 3
Answers
B.
RAID level 5
B.
RAID level 5
Answers
C.
RAID level 1
C.
RAID level 1
Answers
D.
RAID level 0
D.
RAID level 0
Answers
Suggested answer: D

What represents the ability of an organization to respond under emergency in order to minimize the damage to its brand name, business operation, and profit?

A.
Disaster recovery
A.
Disaster recovery
Answers
B.
Incident management
B.
Incident management
Answers
C.
Emergency management
C.
Emergency management
Answers
D.
Crisis management
D.
Crisis management
Answers
Suggested answer: D

Which of the following provides enhanced password protection, secured loT connections, and encompasses stronger encryption techniques?

A.
WPA3
A.
WPA3
Answers
B.
WEP
B.
WEP
Answers
C.
WPA
C.
WPA
Answers
D.
WPA2
D.
WPA2
Answers
Suggested answer: A

John has been working a* a network administrator at an IT company. He wants to prevent misuse of accounts by unauthorized users. He wants to ensure that no accounts have empty passwords. Which of the following commands does John use to list all the accounts with an empty password?

A.
A.
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
Suggested answer: A

Maximus Tech Is a multinational company that uses Cisco ASA Firewalls for their systems. Jason is the one of the members of the team that checks the logs at Maximus Tech. As a part of his job. he is going through me logs and he came across a firewall log that looks like this:

May 06 2018 21:27:27 asa 1: % ASA -6-11008: User enable_16' executed the 'configure term' command

Based on the security level mentioned in the log, what did Jason understand about the description of this message?

A.
Normal but significant message
A.
Normal but significant message
Answers
B.
Informational message
B.
Informational message
Answers
C.
Critical condition message
C.
Critical condition message
Answers
D.
Warning condition message
D.
Warning condition message
Answers
Suggested answer: D

Which risk management phase helps in establishing context and quantifying risks?

A.
Risk identification
A.
Risk identification
Answers
B.
Risk assessment
B.
Risk assessment
Answers
C.
Risk review
C.
Risk review
Answers
D.
Risk treatment
D.
Risk treatment
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62