ExamGecko
Home / ECCouncil / 712-50 / List of questions
Ask Question

ECCouncil 712-50 Practice Test - Questions Answers, Page 25

Add to Whishlist

List of questions

Question 241

Report Export Collapse

In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:

Become a Premium Member for full access
  Unlock Premium Member

Question 242

Report Export Collapse

What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?

Become a Premium Member for full access
  Unlock Premium Member

Question 243

Report Export Collapse

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

Become a Premium Member for full access
  Unlock Premium Member

Question 244

Report Export Collapse

Which of the following is the MAIN security concern for public cloud computing?

Become a Premium Member for full access
  Unlock Premium Member

Question 245

Report Export Collapse

The process of identifying and classifying assets is typically included in the

Become a Premium Member for full access
  Unlock Premium Member

Question 246

Report Export Collapse

Which of the following is a symmetric encryption algorithm?

Become a Premium Member for full access
  Unlock Premium Member

Question 247

Report Export Collapse

You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?

Become a Premium Member for full access
  Unlock Premium Member

Question 248

Report Export Collapse

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

Become a Premium Member for full access
  Unlock Premium Member

Question 249

Report Export Collapse

What type of attack requires the least amount of technical equipment and has the highest success rate?

Become a Premium Member for full access
  Unlock Premium Member

Question 250

Report Export Collapse

Physical security measures typically include which of the following components?

Become a Premium Member for full access
  Unlock Premium Member
Total 460 questions
Go to page: of 46

Related questions