ECCouncil 312-38 Practice Test - Questions Answers, Page 9
List of questions
Related questions
Which of the following techniques uses a modem in order to automatically scan a list of telephone numbers?
FILL BLANK
Fill in the blank with the appropriate file system. Alternate Data Streams (ADS) is a feature of the______________ file system, allowing more than one data stream to be associated with a filename.
Which of the following policies is used to add additional information about the overall security posture and serves to protect employees and organizations from inefficiency or ambiguity?
Which of the following statements best describes the consequences of the disaster recovery plan test?
FILL BLANK
Fill in the blank with the appropriate word. The primary goal of _________________ risk analysis is to determine the proportion of effect and theoretical response.
Which of the following topologies is a type of physical network design where each computer in the network is connected to a central device through an unshielded twisted-pair (UTP) wire?
FILL BLANK
Fill in the blank with the appropriate term. A _____________ is a technique to authenticate digital documents by using computer cryptography.
Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?
Fill in the blank with the appropriate term. The_______________ is typically considered as the top InfoSec officer in the organization and helps in maintaining current and appropriate body of knowledge required to perform InfoSec management functions.
In which of the following types of port scans does the scanner attempt to connect to all 65535 ports?
Question