ECCouncil 312-38 Practice Test - Questions Answers, Page 66
List of questions
Question 651
Which of the following includes examining the probability, impact status, and exposure of risk?
Question 652
Which of the following network security controls can an administrator use to detect, deflect or study attempts to gain unauthorized access to information systems?
Question 653
Which of the following best describes the Log Normalization process?
Question 654
Which encryption algorithm is used by WPA3 encryption?
Question 655
What is composite signature-based analysis?
Question 656
Who acts as an intermediary to provide connectivity and transport services between cloud consumers and providers?
Question 657
What is Azure Key Vault?
Question 658
Which policies exist only on AWS IAM identity (user, group, or role)?
Question 659
Ryan is a network security administrator, who wants to implement local security policies for privileges granted to users and groups, system security audit settings, user authentication, and want to send security audit messages to the Event Log. Which Windows security component fulfills Ryan's requirement?
Question 660
Jeanne is working as a network administrator in an IT company. She wants to control/limit container access to CPU, memory, swap, block IO (rates), network. Which Linux kernel feature allows Jeanne to manage, restrict, and audit groups of the process?
Question