ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 62

List of questions

Question 611

Report Export Collapse

What defines the maximum time period an organization is willing to lose data during a major IT outage event?

Become a Premium Member for full access
  Unlock Premium Member

Question 612

Report Export Collapse

Implementing access control mechanisms, such as a firewall, to protect the network is an example of which of the following network defense approach?

Become a Premium Member for full access
  Unlock Premium Member

Question 613

Report Export Collapse

Which of the following is a database encryption feature that secures sensitive data by encrypting it in client applications without revealing the encrypted keys to the data engine in MS SQL Server?

Become a Premium Member for full access
  Unlock Premium Member

Question 614

Report Export Collapse

Which of the following provides the target for designing DR and BC solutions?

Become a Premium Member for full access
  Unlock Premium Member

Question 615

Report Export Collapse

Which biometric technique authenticates people by analyzing the layer of blood vessels at the back of their eyes?

Become a Premium Member for full access
  Unlock Premium Member

Question 616

Report Export Collapse

Which of the following examines Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) for a disaster recovery strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 617

Report Export Collapse

An insider in Hexagon, a leading IT company in USA, was testing a packet crafting tool. This tool generated a lot of malformed TCP/IP packets which crashed the main server's operating system leading to restricting the employees' accesses. Which attack did the insider use in the above situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 618

Report Export Collapse

James, a network admin in a large US based IT firm, was asked to audit and implement security controls over all network layers to achieve Defense-in-Depth. While working on this assignment, James has implemented both blacklisting and whitelisting ACLs. Which layer of defense-in-depth architecture is Jason working on currently?

Become a Premium Member for full access
  Unlock Premium Member

Question 619

Report Export Collapse

Which of the following DDoS attacks overloads a service by sending inundate packets?

Become a Premium Member for full access
  Unlock Premium Member

Question 620

Report Export Collapse

John, who works as a team lead in Zen Technologies, found that his team members were accessing social networking sites, shopping sites and watching movies during office hours. He approached the network admin to block such websites. What kind of network security device can be used to implement John's decision?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions