ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 60

Question list
Search
Search

List of questions

Search

Related questions











Which type of risk treatment process Includes not allowing the use of laptops in an organization to ensure its security?

A.
Risk avoidance
A.
Risk avoidance
Answers
B.
Mitigate the risk
B.
Mitigate the risk
Answers
C.
Eliminate the risk
C.
Eliminate the risk
Answers
D.
Reduce the risk
D.
Reduce the risk
Answers
Suggested answer: A

Identity the correct order for a successful black hat operation.

A.
Reconnaissance. Scanning, Gaining Access. Maintaining Access, and Covering Tracks
A.
Reconnaissance. Scanning, Gaining Access. Maintaining Access, and Covering Tracks
Answers
B.
Scanning, Reconnaissance, Gaining Access. Maintaining Access and Covering Tracks
B.
Scanning, Reconnaissance, Gaining Access. Maintaining Access and Covering Tracks
Answers
C.
Reconnaissance. Gaming Access, Scanning. Maintaining Access, and Covering Tracks
C.
Reconnaissance. Gaming Access, Scanning. Maintaining Access, and Covering Tracks
Answers
D.
Reconnaissance, Scanning, Gaining Access, Covering Tracks, and Maintaining Access
D.
Reconnaissance, Scanning, Gaining Access, Covering Tracks, and Maintaining Access
Answers
Suggested answer: A

What should an administrator do while installing a sniffer on a system to listen to all data transmitted over the network?

A.
Set the system's NIC to managed mode
A.
Set the system's NIC to managed mode
Answers
B.
Set the system's NIC to master mode
B.
Set the system's NIC to master mode
Answers
C.
Set the system's NIC to ad-hoc mode
C.
Set the system's NIC to ad-hoc mode
Answers
D.
Set the system's NIC to promiscuous mode
D.
Set the system's NIC to promiscuous mode
Answers
Suggested answer: D

Identity the method involved in purging technique of data destruction.

A.
Incineration
A.
Incineration
Answers
B.
Overwriting
B.
Overwriting
Answers
C.
Degaussing
C.
Degaussing
Answers
D.
Wiping
D.
Wiping
Answers
Suggested answer: B

What enables an organization to analyze, identify, and rectify hazards and prevent future recurrence in business continuity management?

A.
Business recovery
A.
Business recovery
Answers
B.
Crisis management
B.
Crisis management
Answers
C.
Incident management
C.
Incident management
Answers
D.
Emergency management
D.
Emergency management
Answers
Suggested answer: C

Michelle is a network security administrator working at a multinational company. She wants to provide secure access to corporate data (documents, spreadsheets, email, schedules, presentations, and other enterprise data) on mobile devices across organizations networks without being slowed down and also wants to enable easy and secure sharing of information between devices within an enterprise. Based on the above mentioned requirements, which among the following solution should Michelle implement?

A.
MEM
A.
MEM
Answers
B.
MAM
B.
MAM
Answers
C.
MCM
C.
MCM
Answers
D.
MDM
D.
MDM
Answers
Suggested answer: D

Which firewall technology can be implemented in all (application, session, transport, network, and presentation) layers of the OSl model?

A.
Circuit-level gateway
A.
Circuit-level gateway
Answers
B.
Network address translation
B.
Network address translation
Answers
C.
VPN
C.
VPN
Answers
D.
Packet filtering
D.
Packet filtering
Answers
Suggested answer: A

Richard has been working as a Linux system administrator at an MNC. He wants to maintain a productive and secure environment by improving the performance of the systems through Linux patch management. Richard is using Ubuntu and wants to patch the Linux systems manually. Which among the following command installs updates (new ones) for Debun based Linux OSes?

A.
sudo apt-get dist-upgrade
A.
sudo apt-get dist-upgrade
Answers
B.
sudo apt-get update
B.
sudo apt-get update
Answers
C.
sudo apt-get dist-update
C.
sudo apt-get dist-update
Answers
D.
sudo apt-get upgrate
D.
sudo apt-get upgrate
Answers
Suggested answer: D

Which of the following is a data destruction technique that protects the sensitivity of information against a laboratory attack where an unauthorized individual uses signal processing recovery tools in a laboratory environment to recover the information?

A.
Purging
A.
Purging
Answers
B.
Destroying
B.
Destroying
Answers
C.
Clearing
C.
Clearing
Answers
D.
Disposal
D.
Disposal
Answers
Suggested answer: A

Which firewall technology provides the best of both packet filtering and application-based filtering and is used in Cisco Adaptive Security Appliances?

A.
VPN
A.
VPN
Answers
B.
Stateful multilayer inspection
B.
Stateful multilayer inspection
Answers
C.
Application level gateway
C.
Application level gateway
Answers
D.
Network address translation
D.
Network address translation
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62