ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 68

Add to Whishlist

List of questions

Question 671

Report Export Collapse

Identify the Password Attack Technique in which the adversary attacks cryptographic hash functions based on the probability, that if a hashing process is used for creating a key, then the same is used for other keys?

Become a Premium Member for full access
  Unlock Premium Member

Question 672

Report Export Collapse

Riya bought some clothes and a watch from an online shopping site a few days back. Since then, whenever she accesses any other application (games, browser, etc.) on her mobile, she is spammed with advertisements for clothes and watches similar to the ones she bought. What can be the underlying reason for Riya's situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 673

Report Export Collapse

Which among the following control and manage the communication between VNF with computing, storage, and network resources along with virtualization?

Become a Premium Member for full access
  Unlock Premium Member

Question 674

Report Export Collapse

Martin is a professional hacker. He is performing reconnaissance on an organization to hack a few target systems. As a part of this method, he needs to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls, etc. To obtain such information, Martin decided to use automated tools.

Which of the following tool must be employed by Martin?

Become a Premium Member for full access
  Unlock Premium Member

Question 675

Report Export Collapse

_______________ is a structured and continuous process which integrates information security and risk management activities into the system development life cycle (SDLC).

Become a Premium Member for full access
  Unlock Premium Member

Question 676

Report Export Collapse

Which of the following Layers of IoT Architecture provides dashboards to monitor, analyze, and implement proactive decisions?

Become a Premium Member for full access
  Unlock Premium Member

Question 677

Report Export Collapse

Which of the following connects the SDN application layer and SDN controller and allows communication between the network services and business applications?

Become a Premium Member for full access
  Unlock Premium Member

Question 678

Report Export Collapse

A CCTV camera, which can be accessed on the smartphone from a remote location, is an example of _____

Become a Premium Member for full access
  Unlock Premium Member

Question 679

Report Export Collapse

How is the chip-level security of an IoT device achieved?

Become a Premium Member for full access
  Unlock Premium Member

Question 680

Report Export Collapse

A popular e-commerce company has recently received a lot of complaints from its customers. Most of the complaints are about the customers being redirected to some other website when trying to access the e-com site, leading to all their systems being compromised and corrupted. Upon investigation, the network admin of the firm discovered that some adversary had manipulated the company's IP address in the domain name server's cache. What is such an attack called?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions