ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 61

Question list
Search
Search

Related questions











Which category of suspicious traffic signatures includes SYN flood attempts?

A.
Informational
A.
Informational
Answers
B.
Denial of Service
B.
Denial of Service
Answers
C.
Reconnaissance
C.
Reconnaissance
Answers
D.
Unauthorized access
D.
Unauthorized access
Answers
Suggested answer: B

Which firewall can a network administrator use for better bandwidth management, deep packet inspection, and Hateful inspection?

A.
Circuit-level gateway firewall
A.
Circuit-level gateway firewall
Answers
B.
Next generation firewall
B.
Next generation firewall
Answers
C.
Network address translation
C.
Network address translation
Answers
D.
Stateful muIti-layer inspection firewall
D.
Stateful muIti-layer inspection firewall
Answers
Suggested answer: B

Explanation:


Which scan attempt can penetrate through a router and a firewall that filter incoming packets with particular flags set and is not supported by Windows?

A.
ARP scan attempt
A.
ARP scan attempt
Answers
B.
TCP full connect scan attempt
B.
TCP full connect scan attempt
Answers
C.
TCP null scan attempt
C.
TCP null scan attempt
Answers
D.
PINC sweep attempt
D.
PINC sweep attempt
Answers
Suggested answer: C

Which type of antenna is based on the principle of a satellite dish and can pick up Wi-Fi signals from a distance of ten miles of more?

A.
Yagi antenna
A.
Yagi antenna
Answers
B.
Directional antenna
B.
Directional antenna
Answers
C.
Omnidirectional antenna
C.
Omnidirectional antenna
Answers
D.
Parabolic Grid antenna
D.
Parabolic Grid antenna
Answers
Suggested answer: D

Docker provides Platforms-a-Service (PaaS) through __________ and deliver*; containerized software packages

A.
Storage-level virtualization
A.
Storage-level virtualization
Answers
B.
Network level virtualization
B.
Network level virtualization
Answers
C.
OS level visualization
C.
OS level visualization
Answers
D.
Server-level visualization
D.
Server-level visualization
Answers
Suggested answer: C

Which encryption algorithm h used by WPA5 encryption?

A.
RC4.TKIP
A.
RC4.TKIP
Answers
B.
RC4
B.
RC4
Answers
C.
AES-GCMP 256
C.
AES-GCMP 256
Answers
D.
AES-CCMP
D.
AES-CCMP
Answers
Suggested answer: D

Which type of information security policy addresses the implementation and configuration of technology and user behavior?

A.
Enterprise information security policy
A.
Enterprise information security policy
Answers
B.
Acceptable use policy
B.
Acceptable use policy
Answers
C.
System specific security policy
C.
System specific security policy
Answers
D.
Issue-specific security policy
D.
Issue-specific security policy
Answers
Suggested answer: C

John is the Vice-President of a BPO. He wants to implement a policy allowing employees to use and manage devices purchased by the organization but restrict the use of the device for business use only. Which among the following policies does John want to implement?

A.
COBO policy
A.
COBO policy
Answers
B.
CYOD policy
B.
CYOD policy
Answers
C.
BYOD policy
C.
BYOD policy
Answers
D.
COPE policy
D.
COPE policy
Answers
Suggested answer: B

Which of the following technologies can be used to leverage zero-trust model security?

A.
Software defined networking (SDN)
A.
Software defined networking (SDN)
Answers
B.
Network function visualization (NFV)
B.
Network function visualization (NFV)
Answers
C.
Network visualization (NV)
C.
Network visualization (NV)
Answers
D.
Software defined perimeter (SDP)
D.
Software defined perimeter (SDP)
Answers
Suggested answer: D

Which of the following provides a set of voluntary recommended cyber security features to include in network-capable loT devices?

A.
GCMA
A.
GCMA
Answers
B.
FCMA
B.
FCMA
Answers
C.
NIST
C.
NIST
Answers
D.
GLBA
D.
GLBA
Answers
Suggested answer: C
Total 613 questions
Go to page: of 62