ECCouncil 312-38 Practice Test - Questions Answers, Page 63

List of questions
Question 621

In Public Key Infrastructure (PKI), which authority is responsible for issuing and verifying the certificates?
Question 622

Which encryption algorithm does S/MIME protocol implement for digital signatures in emails?
Question 623

On which of the following OSI layers does the Pretty Good Privacy (PGP) work?
Question 624

What is the IT security team responsible for effectively managing the security of the organization's IT infrastructure, called?
Question 625

Identify the attack where an attacker manipulates or tricks people into revealing their confidential details like bank account information, credit card details, etc.?
Question 626

Which technique is used in RAID level 0 where the data is split into blocks and written evenly across multiple disks?
Question 627

An IT company has just been hit with a severe external security breach. To enhance the company's security posture, the network admin has decided to first block all the services and then individually enable only the necessary services. What is such an Internet access policy called?
Question 628

Which of the following standards does a cloud service provider has to comply with, to protect the privacy of its customer's personal information?
Question 629

A stateful multilayer inspection firewall combines the aspects of Application level gateway, Circuit level gateway and Packet filtering firewall. On which layers of the OSI model, does the Stateful multilayer inspection firewall works?
Question 630

An organization's web server was recently compromised triggering its admin team into action to defend the network. The admin team wants to place the web server in such a way that, even if it is attacked, the other network resources will be unavailable to the attacker. Moreover, the network monitoring will easily detect the future attacks. How can the admin team implement this plan?
Question