Pass the ECCouncil CND 312-38 Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following entities is responsible for cloud security?

Options:

A.

Cloud provider


B.

Cloud consumer


C.

Cloud broker


D.

Both cloud consumer and provider


Expert Solution
Questions # 2:

How is a “risk” represented?

Options:

A.

Asset + threat


B.

Motive (goal) + method


C.

Asset + threat + vulnerability


D.

Motive (goal) + method + vulnerability


Expert Solution
Questions # 3:

Implementing access control mechanisms, such as a firewall, to protect the network is an example of which of the following network defense approach?

Options:

A.

Proactive approach


B.

Retrospective approach


C.

Preventive approach


D.

Reactive approach


Expert Solution
Questions # 4:

David is working in a mid-sized IT company. Management asks him to suggest a framework that can be used effectively to align the IT goals to the business goals of the company. David suggests the______framework,

as it provides a set of controls over IT and consolidates them to form a framework.

Options:

A.

RMIS


B.

ITIL


C.

ISO 27007


D.

COBIT


Expert Solution
Questions # 5:

Which of the following data security technology can ensure information protection by obscuring specific areas of information?

Options:

A.

Data encryption


B.

Data hashing


C.

Data masking


D.

Data retention


Expert Solution
Questions # 6:

Who is responsible for executing the policies and plans required for supporting the information technology and computer systems of an organization?

Options:

A.

Senior management


B.

IT security practitioners


C.

Business and functional managers


D.

Chief Information Officer (CIO)


Expert Solution
Questions # 7:

Choose the correct order of steps to analyze the attack surface.

Options:

A.

Identify the indicators of exposure->visualize the attack surface->simulate the attack->reduce the attack surface


B.

Visualize the attack surface->simulate the attack->identify the indicators of exposure->reduce the attack surface


C.

Identify the indicators of exposure->simulate the attack->visualize the attack surface->reduce the attack surface


D.

Visualize the attack surface->identify the indicators of exposure->simulate the attack->reduce the attack surface


Expert Solution
Questions # 8:

Which of the following network security protocols protects from sniffing attacks by encrypting entire communication between the clients and server including user passwords?

Options:

A.

TACACS+


B.

RADIUS


C.

CHAP


D.

PAP


Expert Solution
Questions # 9:

Which type of modulation technique is used in local area wireless networks (LAWNs)?

Options:

A.

FHSS


B.

OFDM


C.

DSSS


D.

MIMO-OFDM


Expert Solution
Questions # 10:

How does Windows’ in-built security component, AppLocker, whitelist applications?

Options:

A.

Using Path Rule


B.

Using Signature Rule


C.

Using Certificate Rule


D.

Using Internet Zone Rule


Expert Solution
Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions