ECCouncil 312-38 Practice Test - Questions Answers, Page 62
List of questions
Question 611
What defines the maximum time period an organization is willing to lose data during a major IT outage event?
Question 612
Implementing access control mechanisms, such as a firewall, to protect the network is an example of which of the following network defense approach?
Question 613
Which of the following is a database encryption feature that secures sensitive data by encrypting it in client applications without revealing the encrypted keys to the data engine in MS SQL Server?
Question 614
Which of the following provides the target for designing DR and BC solutions?
Question 615
Which biometric technique authenticates people by analyzing the layer of blood vessels at the back of their eyes?
Question 616
Which of the following examines Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs) for a disaster recovery strategy?
Question 617
An insider in Hexagon, a leading IT company in USA, was testing a packet crafting tool. This tool generated a lot of malformed TCP/IP packets which crashed the main server's operating system leading to restricting the employees' accesses. Which attack did the insider use in the above situation?
Question 618
James, a network admin in a large US based IT firm, was asked to audit and implement security controls over all network layers to achieve Defense-in-Depth. While working on this assignment, James has implemented both blacklisting and whitelisting ACLs. Which layer of defense-in-depth architecture is Jason working on currently?
Question 619
Which of the following DDoS attacks overloads a service by sending inundate packets?
Question 620
John, who works as a team lead in Zen Technologies, found that his team members were accessing social networking sites, shopping sites and watching movies during office hours. He approached the network admin to block such websites. What kind of network security device can be used to implement John's decision?
Question