Pass the ECCouncil CND 312-38 Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

Peter works as a network administrator at an IT company. He wants to avoid exploitation of the cloud, particularly Azure services. Which of the following is a group of PowerShell scripts designed to help the network administrator understand how attacks happen and help them protect the cloud?

Options:

A.

MicroBurst


B.

POSH -Sysmon


C.

SecurityPolicyDsc


D.

Sysmon


Expert Solution
Questions # 42:

How is the chip-level security of an loT device achieved?

Options:

A.

Encrypting JTAC interface


B.

Keeping the device on a that network


C.

Closing insecure network services


D.

Changing the password of the router


Expert Solution
Questions # 43:

Which technique is used in RAID level 0 where the data is split into blocks and written evenly across multiple disks?

Options:

A.

Disk mirroring


B.

Disk stripping


C.

Data splitting


D.

Disk partition


Expert Solution
Questions # 44:

The risk assessment team in Southern California has estimated that the probability of an incident that has potential to impact almost 80% of the bank's business is very high. How should this risk be categorized in the

risk matrix?

Options:

A.

High


B.

Medium


C.

Extreme


D.

Low


Expert Solution
Questions # 45:

Which of the following is a windows in-built feature that provides filesystem-level encryption in the OS (starting from Windows 2000). except the Home version of Windows?

Options:

A.

Bit Locker


B.

EFS


C.

Disk Utility


D.

FileVault


Expert Solution
Questions # 46:

Which of the following is an example of Indicators of Attack?

Options:

A.

Malware


B.

Signatures


C.

Exploits


D.

Remote code execution


Expert Solution
Questions # 47:

Dan and Alex are business partners working together. Their Business-Partner Policy states that they should encrypt their emails before sending to each other. How will they ensure the authenticity of their emails?

Options:

A.

Dan will use his public key to encrypt his mails while Alex will use Dan's digital signature to verify the authenticity of the mails.


B.

Dan will use his private key to encrypt his mails while Alex will use his digital signature to verify the authenticity of the mails.


C.

Dan will use his digital signature to sign his mails while Alex will use his private key to verify the authenticity of the mails.


D.

Dan will use his digital signature to sign his mails while Alex will use Dan's public key to verify the authencity of the mails.


Expert Solution
Questions # 48:

An IDS or IDPS can be deployed in two modes. Which deployment mode allows the IDS to both

detect and stop malicious traffic?

Options:

A.

promiscuous mode


B.

passive mode


C.

firewall mode


D.

inline mode


Expert Solution
Questions # 49:

What can be the possible number of IP addresses that can be assigned to the hosts present in a subnet having 255.255.255.224 subnet mask?

Options:

A.

62


B.

30


C.

14


D.

126


Expert Solution
Questions # 50:

Justine has been tasked by her supervisor to ensure that the company's physical security is on the same level as their logical security measures. She installs video cameras at all entrances and exits and installs badge

access points for all doors. The last item she wants to install is a method to prevent unauthorized people piggybacking employees. What should she install to prevent piggybacking?

Options:

A.

She should install a mantrap


B.

Justine needs to install a biometrics station at each entrance


C.

Justine will need to install a revolving security door


D.

She should install a Thompson Trapdoor.


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions