Pass the ECCouncil CND 312-38 Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

The CEO of Max Rager wants to send a confidential message regarding the new formula for its coveted soft drink, SuperMax, to its manufacturer in Texas. However, he fears the message could be altered in

transit. How can he prevent this incident from happening and what element of the message ensures the success of this method?

Options:

A.

Hashing; hash code


B.

Symmetric encryption; secret key


C.

Hashing; public key


D.

Asymmetric encryption; public key


Expert Solution
Questions # 22:

Which of the following standards does a cloud service provider has to comply with, to protect the privacy of its customer’s personal information?

Options:

A.

ISO/IEC 27018


B.

ISO/IEC 27019


C.

ISO/IEC 27020


D.

ISO/IEC 27021


Expert Solution
Questions # 23:

Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization had to increase the amount of staff. The network administrator is finding it difficult to accommodate an increasing

number of employees in the existing network topology. So the organization is planning to implement a new topology where it will be easy to accommodate an increasing number of employees. Which network topology

will help the administrator solve the problem of needing to add new employees and expand?

Options:

A.

Bus


B.

Star


C.

Ring


D.

Mesh


Expert Solution
Questions # 24:

Which of the following is true regarding any attack surface?

Options:

A.

Decrease in vulnerabilities decreases the attack surface


B.

Increase in vulnerabilities decreases the attack surface


C.

Decrease in risk exposures increases the attack surface


D.

Decrease in vulnerabilities increases the attack surface


Expert Solution
Questions # 25:

Bryson is the IT manager and sole IT employee working for a federal agency in California. The agency was just given a grant and was able to hire on 30 more employees for a new extended project. Because of this,

Bryson has hired on two more IT employees to train up and work. Both of his new hires are straight out of college and do not have any practical IT experience. Bryson has spent the last two weeks teaching the new

employees the basics of computers, networking, troubleshooting techniques etc. To see how these two new hires are doing, he asks them at what layer of the OSI model do Network Interface Cards (NIC) work on. What

should the new employees answer?

Options:

A.

NICs work on the Session layer of the OSI model.


B.

The new employees should say that NICs perform on the Network layer.


C.

They should tell Bryson that NICs perform on the Physical layer


D.

They should answer with the Presentation layer.


Expert Solution
Questions # 26:

Wallcot, a retail chain in US and Canada, wants to improve the security of their administration

offices. They want to implement a mechanism with two doors. Only one of the doors can be opened at a

time. Once people enter from the first door, they have to be authorized to open the next one. Failing

the authorization, the person will be locked between the doors until an authorized person lets him or

her out. What is such a mechanism called?

Options:

A.

Mantrap


B.

Physical locks


C.

Concealed detection device


D.

Alarm system


Expert Solution
Questions # 27:

The bank where you work has 600 windows computers and 400 Red Hat computers which primarily serve as bank teller consoles. You have created a plan and deployed all the patches to the Windows computers and

you are now working on updating the Red Hat computers. What command should you run on the network to update the Red Hat computers, download the security package, force the package installation, and update all

currently installed packages?

Options:

A.

You should run the up2date -d -f -u command


B.

You should run the up2data -u command


C.

You should run the WSUS -d -f -u command.


D.

You should type the sysupdate -d command


Expert Solution
Questions # 28:

Which of the following is consumed into SIEM solutions to take control of chaos, gain in-depth knowledge of threats, eliminate false positives, and implement proactive intelligence-driven defense?

Options:

A.

Threat intelligence sources


B.

Threat intelligence feeds


C.

Threat intelligence platform


D.

Threat intelligence professional services


Expert Solution
Questions # 29:

The company has implemented a backup plan. James is working as a network administrator for the company and is taking full backups of the data every time a backup is initiated. Alex who is a senior security manager

talks to him about using a differential backup instead and asks him to implement this once a full backup of the data is completed. What is/are the reason(s) Alex is suggesting that James use a differential backup?

(Select all that apply)

Options:

A.

Less storage space is required


B.

Father restoration


C.

Slower than a full backup


D.

Faster than a full backup


E.

Less expensive than full backup


Expert Solution
Questions # 30:

Identity the method involved in purging technique of data destruction.

Options:

A.

Incineration


B.

Overwriting


C.

Degaussing


D.

Wiping


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions