ECCouncil 712-50 Practice Test - Questions Answers, Page 25

List of questions
Question 241

In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:
Question 242

What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?
Question 243

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?
Question 244

Which of the following is the MAIN security concern for public cloud computing?
Question 245

The process of identifying and classifying assets is typically included in the
Question 246

Which of the following is a symmetric encryption algorithm?
Question 247

You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?
Question 248

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.
Question 249

What type of attack requires the least amount of technical equipment and has the highest success rate?
Question 250

Physical security measures typically include which of the following components?
Question