ECCouncil 312-38 Practice Test - Questions Answers, Page 66

List of questions
Question 651

Which of the following includes examining the probability, impact status, and exposure of risk?
Question 652

Which of the following network security controls can an administrator use to detect, deflect or study attempts to gain unauthorized access to information systems?
Question 653

Which of the following best describes the Log Normalization process?
Question 654

Which encryption algorithm is used by WPA3 encryption?
Question 655

What is composite signature-based analysis?
Question 656

Who acts as an intermediary to provide connectivity and transport services between cloud consumers and providers?
Question 657

What is Azure Key Vault?
Question 658

Which policies exist only on AWS IAM identity (user, group, or role)?
Question 659

Ryan is a network security administrator, who wants to implement local security policies for privileges granted to users and groups, system security audit settings, user authentication, and want to send security audit messages to the Event Log. Which Windows security component fulfills Ryan's requirement?
Question 660

Jeanne is working as a network administrator in an IT company. She wants to control/limit container access to CPU, memory, swap, block IO (rates), network. Which Linux kernel feature allows Jeanne to manage, restrict, and audit groups of the process?
Question