ECCouncil 312-38 Practice Test - Questions Answers, Page 64

List of questions
Question 631

Daniel works as a network administrator in an Information Security company. He has just deployed an IDS in his organization's network and wants to calculate the false positive rate for his implementation. Which of the following formulae can he use to so?
Question 632

Patrick wants to change the file permission of a file with permission value 755 to 744. He used a Linux command chmod [permission Value] [File Name] to make these changes. What will be the change in the file access?
Question 633

David, a network and system admin, encrypted all the files in a Windows system that supports NTFS file system using Encrypted File Systems (EFS). He then backed up the same files into another Windows system that supports FAT file system. Later, he found that the backup files were not encrypted. What could be the reason for this?
Question 634

Wallcot, a retail chain in US and Canada, wants to improve the security of their administration offices. They want to implement a mechanism with two doors. Only one of the doors can be opened at a time. Once people enter from the first door, they have to be authorized to open the next one. Failing the authorization, the person will be locked between the doors until an authorized person lets him or her out. What is such a mechanism called?
Question 635

Under which of the following acts can an international financial institution be prosecuted if it fails to maintain the privacy of its customer's information?
Question 636

Which wireless networking topology setup requires same channel name and SSID?
Question 637

Which of the following Wireshark filters can a network administrator use to view the packets without any flags set in order to detect TCP Null Scan attempts?
Question 638

Which of the following commands can be used to disable unwanted services on Debian, Ubuntu and other Debian-based Linux distributions?
Question 639

What should a network administrator perform to execute/test the untrusted or untested programs or code from untrusted or unverified third-parties without risking the host system or OS?
Question 640

In what type of IoT communication model do devices interact with each other through the internet, primarily using protocols such as ZigBee, Z-Wave, or Bluetooth?
Question