ECCouncil 312-38 Practice Test - Questions Answers, Page 62
List of questions
Question 611

What defines the maximum time period an organization is willing to lose data during a major IT outage event?
Question 612

Implementing access control mechanisms, such as a firewall, to protect the network is an example of which of the following network defense approach?
Question 613

Which of the following is a database encryption feature that secures sensitive data by encrypting it in client applications without revealing the encrypted keys to the data engine in MS SQL Server?
Question 614

Which of the following provides the target for designing DR and BC solutions?
Question 615

Which biometric technique authenticates people by analyzing the layer of blood vessels at the back of their eyes?
Question 616

Which of the following examines Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) for a disaster recovery strategy?
Question 617

An insider in Hexagon, a leading IT company in USA, was testing a packet crafting tool. This tool generated a lot of malformed TCP/IP packets which crashed the main server's operating system leading to restricting the employees' accesses. Which attack did the insider use in the above situation?
Question 618

James, a network admin in a large US based IT firm, was asked to audit and implement security controls over all network layers to achieve Defense-in-Depth. While working on this assignment, James has implemented both blacklisting and whitelisting ACLs. Which layer of defense-in-depth architecture is Jason working on currently?
Question 619

Which of the following DDoS attacks overloads a service by sending inundate packets?
Question 620

John, who works as a team lead in Zen Technologies, found that his team members were accessing social networking sites, shopping sites and watching movies during office hours. He approached the network admin to block such websites. What kind of network security device can be used to implement John's decision?
Question