ECCouncil 712-50 Practice Test - Questions Answers, Page 25
List of questions
Question 241
In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
Question 242
What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
Question 243
Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
Question 244
Which of the following is the MAIN security concern for public cloud computing?
Question 245
The process of identifying and classifying assets is typically included in the
Question 246
Which of the following is a symmetric encryption algorithm?
Question 247
You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Question 248
As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
Question 249
What type of attack requires the least amount of technical equipment and has the highest success rate?
Question 250
Physical security measures typically include which of the following components?
Question