ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 58

Question list
Search
Search

Related questions











Which of the following is a windows in-built feature that provides filesystem-level encryption in the OS (starting from Windows 2000). except the Home version of Windows?

A.
Bit Locker
A.
Bit Locker
Answers
B.
EFS
B.
EFS
Answers
C.
Disk Utility
C.
Disk Utility
Answers
D.
FileVault
D.
FileVault
Answers
Suggested answer: B

A local bank wants to protect their cardholder dat a. Which standard should the bark comply with in order to ensure security of this data?

A.
GDPR
A.
GDPR
Answers
B.
HIPAA
B.
HIPAA
Answers
C.
SOX
C.
SOX
Answers
D.
PCI DSS
D.
PCI DSS
Answers
Suggested answer: D

Which of the following filters can be used to detect UDP scan attempts using Wireshark?

A.
icmp.type==3 and icmp.code==3
A.
icmp.type==3 and icmp.code==3
Answers
B.
icmp.type==13
B.
icmp.type==13
Answers
C.
icmp.type==8 or icmp.type==0
C.
icmp.type==8 or icmp.type==0
Answers
D.
icmp.type==15
D.
icmp.type==15
Answers
Suggested answer: A

Which of the following is a drawback of traditional perimeter security?

A.
Traditional firewalls are static in nature
A.
Traditional firewalls are static in nature
Answers
B.
Traditional VPNs follow identity centric instead of trust based network centric approach
B.
Traditional VPNs follow identity centric instead of trust based network centric approach
Answers
C.
Traditional perimeter security is identity-centric
C.
Traditional perimeter security is identity-centric
Answers
D.
Traditional firewalls are dynamic in nature
D.
Traditional firewalls are dynamic in nature
Answers
Suggested answer: A

Which of the following filters car be applied to detect an ICMP ping sweep attempt using Wireshark?

A.
icmp.type==8
A.
icmp.type==8
Answers
B.
icmp.type==13
B.
icmp.type==13
Answers
C.
icmp.type==17
C.
icmp.type==17
Answers
D.
icmp.type==15
D.
icmp.type==15
Answers
Suggested answer: A

Which of the following statements holds true in terms of virtual machines?

A.
Hardware-level virtualization takes place in VMs
A.
Hardware-level virtualization takes place in VMs
Answers
B.
All VMs share the host OS
B.
All VMs share the host OS
Answers
C.
VMs are light weight than container
C.
VMs are light weight than container
Answers
D.
OS-level virtualization takes place in VMs
D.
OS-level virtualization takes place in VMs
Answers
Suggested answer: A

Rosa is working as a network defender at Linda Systems. Recently, the company migrated from Windows to MacOS. Rosa wants to view the security related logs of her system, where con she find these logs?

A.
/private/var/log
A.
/private/var/log
Answers
B.
/var/log/cups/access-log
B.
/var/log/cups/access-log
Answers
C.
/Library/Logs/Sync
C.
/Library/Logs/Sync
Answers
D.
/Library/Logs
D.
/Library/Logs
Answers
Suggested answer: A

Which type of modulation technique is used in local area wireless networks (LAWNs)?

A.
FHSS
A.
FHSS
Answers
B.
OFDM
B.
OFDM
Answers
C.
DSSS
C.
DSSS
Answers
D.
MIMO-OFDM
D.
MIMO-OFDM
Answers
Suggested answer: C

Which of following are benefits of using loT devices in loT-enabled environments? I. loT device car be connected anytime M. loT device can be connected at any place ill. loT devices connected to anything

A.
I, II and III
A.
I, II and III
Answers
B.
I
B.
I
Answers
C.
II
C.
II
Answers
D.
I and II
D.
I and II
Answers
Suggested answer: A

Who is responsible for executing the policies and plans required for supporting the information technology and computer systems of an organization?

A.
Senior management
A.
Senior management
Answers
B.
IT security practitioners
B.
IT security practitioners
Answers
C.
Business and functional managers
C.
Business and functional managers
Answers
D.
Chief Information Officer (CIO)
D.
Chief Information Officer (CIO)
Answers
Suggested answer: D
Total 613 questions
Go to page: of 62