ECCouncil 312-38 Practice Test - Questions Answers, Page 61
List of questions
Question 601
Which category of suspicious traffic signatures includes SYN flood attempts?
Question 602
Which firewall can a network administrator use for better bandwidth management, deep packet inspection, and Hateful inspection?
Question 603
Which scan attempt can penetrate through a router and a firewall that filter incoming packets with particular flags set and is not supported by Windows?
Question 604
Which type of antenna is based on the principle of a satellite dish and can pick up Wi-Fi signals from a distance of ten miles of more?
Question 605
Docker provides Platforms-a-Service (PaaS) through __________ and deliver*; containerized software packages
Question 606
Which encryption algorithm h used by WPA5 encryption?
Question 607
Which type of information security policy addresses the implementation and configuration of technology and user behavior?
Question 608
John is the Vice-President of a BPO. He wants to implement a policy allowing employees to use and manage devices purchased by the organization but restrict the use of the device for business use only. Which among the following policies does John want to implement?
Question 609
Which of the following technologies can be used to leverage zero-trust model security?
Question 610
Which of the following provides a set of voluntary recommended cyber security features to include in network-capable loT devices?
Question