ECCouncil 312-38 Practice Test - Questions Answers, Page 67

List of questions
Question 661

Michelle is a network security administrator working in an MNC company. She wants to set a resource limit for CPU in a container. Which command-line allows Michelle to limit a container to 2
CPUs?
Question 662

Which RAID level does not provide data redundancy?
Question 663

Which of the following wireless encryption provides enhanced password protection, secured IoT connections, and encompasses stronger encryption techniques?
Question 664

Delta IT solutions suffered a substantial data loss translating into a huge monetary loss for them. While investigation, the network admin analyzed all the packets and traffic transmitted across the network and identified that some user, within the organization, had leaked the data. Which of the following devices could have helped the network admin reach this conclusion?
Question 665

Which authorization lets users access a requested resource on behalf of others?
Question 666

To secure his company's network, Tim the network admin, installed a security device that inspected all inbound and outbound network traffic for suspicious patterns. The device was configured to alert him if it found any such suspicious activity. Identify the type of network security device installed by Tim?
Question 667

Which of the following manages the Docker images, containers, networks, and storage volume and processes the request of Docker API?
Question 668

HexCom, a leading IT Company in the USA, realized that their employees were having trouble accessing multiple servers with different passwords. Due to this, the centralized server was also being overburdened by avoidable network traffic. To overcome the issue, what type of authentication can be given to the employees?
Question 669

Jorge has developed a core program for a mobile application and saved it locally on his system. The next day, when he tried to access the file to work on it further, he found it missing from his system.
Upon investigation, it was discovered that someone got into his system since he had not changed his login credentials, and that they were the ones that were given to him by the admin when he had joined the organization. Which of the following network security vulnerabilities can be attributed to Jorge's situation?
Question 670

Individuals in the organization using system resources against acceptable usage policies indicates which of the following security incident:
Question