ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 59

Question list
Search
Search

Related questions











Who oversees all the incident response activities in an organization and is responsible for all actions of the IR team and IR function?

A.
IR officer
A.
IR officer
Answers
B.
Attorney
B.
Attorney
Answers
C.
IR custodians
C.
IR custodians
Answers
D.
PR specialist
D.
PR specialist
Answers
Suggested answer: A

How is the chip-level security of an loT device achieved?

A.
Encrypting JTAC interface
A.
Encrypting JTAC interface
Answers
B.
Keeping the device on a that network
B.
Keeping the device on a that network
Answers
C.
Closing insecure network services
C.
Closing insecure network services
Answers
D.
Changing the password of the router
D.
Changing the password of the router
Answers
Suggested answer: A

Which of the following characteristics represents a normal TCP packet?

A.
SYN and FIN bits are set
A.
SYN and FIN bits are set
Answers
B.
Source or destination port b zero
B.
Source or destination port b zero
Answers
C.
FIN ACK and ACK are used in terminating the connection
C.
FIN ACK and ACK are used in terminating the connection
Answers
D.
The destination address is a broadcast address
D.
The destination address is a broadcast address
Answers
Suggested answer: C

According to standard loT security practice, loT Gateway should be connected to a -------------

A.
Border router
A.
Border router
Answers
B.
Secure router
B.
Secure router
Answers
C.
Pouter that is connected to internal servers
C.
Pouter that is connected to internal servers
Answers
D.
Router that is connected to other subnets
D.
Router that is connected to other subnets
Answers
Suggested answer: D

Mark is monitoring the network traffic on his organization's network. He wants to detect TCP and UDP ping sweeps on his network. Which type of filter will be used to detect this?

A.
tcp.dstport==7 and udp.srcport==7
A.
tcp.dstport==7 and udp.srcport==7
Answers
B.
tcp.dstport==7 and udp.dstport==7
B.
tcp.dstport==7 and udp.dstport==7
Answers
C.
tcp.dstport==7 and udp.dstport==7
C.
tcp.dstport==7 and udp.dstport==7
Answers
D.
tcp.dstport==7 and udp.srcport==7
D.
tcp.dstport==7 and udp.srcport==7
Answers
Suggested answer: A

Oliver is a Linux security administrator at an MNC. An employee named Alice has resigned from his organization and Oliver wants to disable this user in Ubuntu. Which of the following commands can be used to accomplish this?

A.
usermod -3 alice
A.
usermod -3 alice
Answers
B.
uscrmod- K alice
B.
uscrmod- K alice
Answers
C.
usermod- L alice
C.
usermod- L alice
Answers
D.
usermod- M alice
D.
usermod- M alice
Answers
Suggested answer: C

Who is responsible for conveying company details after an incident?

A.
PR specialist
A.
PR specialist
Answers
B.
IR officer
B.
IR officer
Answers
C.
IR manager
C.
IR manager
Answers
D.
IR custodians
D.
IR custodians
Answers
Suggested answer: A

Which type of training can create awareness among employees regarding compliance issues?

A.
Social engineering awareness training
A.
Social engineering awareness training
Answers
B.
Security policy training
B.
Security policy training
Answers
C.
Physical security awareness training
C.
Physical security awareness training
Answers
D.
Training on data classification
D.
Training on data classification
Answers
Suggested answer: B

Which among the following options represents professional hackers with an aim of attacking systems for profit?

A.
Script kiddies
A.
Script kiddies
Answers
B.
Organized hackers
B.
Organized hackers
Answers
C.
Hacktivists
C.
Hacktivists
Answers
D.
Cyber terrorists
D.
Cyber terrorists
Answers
Suggested answer: B

Which of the following data security technology can ensure information protection by obscuring specific areas of information?

A.
Data encryption
A.
Data encryption
Answers
B.
Data hashing
B.
Data hashing
Answers
C.
Data masking
C.
Data masking
Answers
D.
Data retention
D.
Data retention
Answers
Suggested answer: C
Total 613 questions
Go to page: of 62