Pass the ECCouncil CND 312-38 Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

How is the chip-level security of an IoT device achieved?

Options:

A.

By closing insecure network services


B.

By turning off the device when not needed or not in use


C.

By encrypting the JTAG interface


D.

By changing the password of the router


Expert Solution
Questions # 82:

If there is a fire incident caused by an electrical appliance short-circuit, which fire suppressant should be used to control it?

Options:

A.

Water


B.

Wet chemical


C.

Dry chemical


D.

Raw chemical


Expert Solution
Questions # 83:

Which field is not included in the TCP header?

Options:

A.

Source IP address


B.

Acknowledgment number


C.

Sequence number


D.

Source Port


Expert Solution
Questions # 84:

Which of the following is a database encryption feature that secures sensitive data by encrypting it in client applications without revealing the encrypted keys to the data engine in MS SQL Server?

Options:

A.

IsEncrypted Enabled


B.

NeverEncrypted disabled


C.

Allow Encrypted


D.

Always Encrypted


Expert Solution
Questions # 85:

Harry has sued the company claiming they made his personal information public on a social networking site in the United States. The company denies the allegations and consulted a/an _______ for legal

advice to defend them against this allegation.

Options:

A.

Evidence Manager


B.

Incident Handler


C.

Attorney


D.

PR Specialist


Expert Solution
Questions # 86:

Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and

communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden’s organization.

Options:

A.

Hybrid virtualization


B.

Hardware-assisted virtualization


C.

Full virtualization


D.

Para virtualization


Expert Solution
Questions # 87:

How can one identify the baseline for normal traffic?

Options:

A.

When the ACK flag appears at the beginning and the RST flag appears at the end of the connection


B.

When the SYN flag appears at the beginning and the FIN flag appears at the end of the connection


C.

When the RST flag appears at the beginning and the ACK flag appears at the end of the connection


D.

When the FIN flag appears at the beginning and the SYN flag appears at the end of the connection


Expert Solution
Questions # 88:

James is a network administrator working at a student loan company in Minnesota. This company processes over 20,000 student loans a year from colleges all over the state. Most communication between the company

schools, and lenders is carried out through emails. Much of the email communication used at his company contains sensitive information such as social security numbers. For this reason, James wants to utilize email

encryption. Since a server-based PKI is not an option for him, he is looking for a low/no cost solution to encrypt emails. What should James use?

Options:

A.

James could use PGP as a free option for encrypting the company's emails.


B.

James should utilize the free OTP software package.


C.

James can use MD5 algorithm to encrypt all the emails


D.

James can enforce mandatory HTTPS in the email clients to encrypt emails


Expert Solution
Questions # 89:

Which of the following is a drawback of traditional perimeter security?

Options:

A.

Traditional firewalls are static in nature


B.

Traditional VPNs follow identity centric instead of trust based network centric approach


C.

Traditional perimeter security is identity-centric


D.

Traditional firewalls are dynamic in nature


Expert Solution
Questions # 90:

John is the Vice-President of a BPO. He wants to implement a policy allowing employees to use and manage devices purchased by the organization but restrict the use of the device for business use only. Which among the following policies does John want to implement?

Options:

A.

COBO policy


B.

CYOD policy


C.

BYOD policy


D.

COPE policy


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions