Pass the ECCouncil CND 312-38 Questions and answers with CertsForce

Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
Questions # 51:

The IR team and the network administrator have successfully handled a malware incident on the network. The team is now preparing countermeasure guideline to avoid a future occurrence of the malware incident.

Which of the following countermeasure(s) should be added to deal with future malware incidents? (Select all that apply)

Options:

A.

Complying with the company's security policies


B.

Implementing strong authentication schemes


C.

Implementing a strong password policy


D.

Install antivirus software


Expert Solution
Questions # 52:

Identify the Password Attack Technique in which the adversary attacks cryptographic hash functions based on the probability, that if a hashing process is used for creating a key, then the same is

used for other keys?

Options:

A.

Dictionary Attack


B.

Brute Forcing Attack


C.

Hybrid Attack


D.

Birthday Attack


Expert Solution
Questions # 53:

Which of the following attack surface increase when you keep USB ports enabled on your laptop unnecessarily?

Options:

A.

Human attack surface


B.

Network attack surface


C.

Physical attack surface


D.

Software attack surface


Expert Solution
Questions # 54:

Syslog and SNMP are the two main _______ protocols through which log records are transferred.

Options:

A.

Pull-based


B.

Push-based


C.

Host-based


D.

Network-based


Expert Solution
Questions # 55:

Kelly is taking backups of the organization's data. Currently, he is taking backups of only those files which are created or modified after the last backup. What type of backup is Kelly using?

Options:

A.

Full backup


B.

Incremental backup


C.

Differential Backup


D.

Normal Backup


Expert Solution
Questions # 56:

In MacOS, how can the user implement disk encryption?

Options:

A.

By enabling BitLocker feature


B.

By executing dm-crypt command


C.

By turning on Device Encryption feature


D.

By enabling FileVault feature


Expert Solution
Questions # 57:

Timothy works as a network administrator in a multinational organization. He decides to implement a dedicated network for sharing storage resources. He uses a_______as it seperates the storage units from the

servers and the user network.

Options:

A.

SAN


B.

SCSA


C.

NAS


D.

SAS


Expert Solution
Questions # 58:

Consider a scenario consisting of a tree network. The root Node N is connected to two man nodes N1 and N2. N1 is connected to N11 and N12. N2 is connected to N21 and N22. What will happen if any one of the main

nodes fail?

Options:

A.

Failure of the main node affects all other child nodes at the same level irrespective of the main node.


B.

Does not cause any disturbance to the child nodes or its tranmission


C.

Failure of the main node will affect all related child nodes connected to the main node


D.

Affects the root node only


Expert Solution
Questions # 59:

During a security awareness program, management was explaining the various reasons which create threats to network security. Which could be a possible threat to network security?

Options:

A.

Configuring automatic OS updates


B.

Having a web server in the internal network


C.

Implementing VPN


D.

Patch management


Expert Solution
Questions # 60:

Identify the minimum number of drives required to setup RAID level 5.

Question # 60

Options:

A.

Multiple


B.

3


C.

4


D.

2


Expert Solution
Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions