Pass the ECCouncil CCISO 712-50 Questions and answers with CertsForce

Viewing page 10 out of 15 pages
Viewing questions 91-100 out of questions
Questions # 91:

Your incident handling manager detects a virus attack in the network of your company. You develop a signature based on the characteristics of the detected virus. Which of the following phases in the incident handling process will utilize the signature to resolve this incident?

Options:

A.

Containment


B.

Recovery


C.

Identification


D.

Eradication


Expert Solution
Questions # 92:

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

Options:

A.

Trusted and untrusted networks


B.

Type of authentication


C.

Storage encryption


D.

Log retention


Expert Solution
Questions # 93:

Which of the following statements about Encapsulating Security Payload (ESP) is true?

Options:

A.

It is an IPSec protocol.


B.

It is a text-based communication protocol.


C.

It uses TCP port 22 as the default port and operates at the application layer.


D.

It uses UDP port 22


Expert Solution
Questions # 94:

In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:

Options:

A.

Secure the area and shut-down the computer until investigators arrive


B.

Secure the area and attempt to maintain power until investigators arrive


C.

Immediately place hard drive and other components in an anti-static bag


D.

Secure the area.


Expert Solution
Questions # 95:

The process for identifying, collecting, and producing digital information in support of legal proceedings is called

Options:

A.

chain of custody.


B.

electronic discovery.


C.

evidence tampering.


D.

electronic review.


Expert Solution
Questions # 96:

Physical security measures typically include which of the following components?

Options:

A.

Physical, Technical, Operational


B.

Technical, Strong Password, Operational


C.

Operational, Biometric, Physical


D.

Strong password, Biometric, Common Access Card


Expert Solution
Questions # 97:

SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:

Options:

A.

‘ o 1=1 - -


B.

/../../../../


C.

“DROPTABLE USERNAME”


D.

NOPS


Expert Solution
Questions # 98:

Which wireless encryption technology makes use of temporal keys?

Options:

A.

Wireless Application Protocol (WAP)


B.

Wifi Protected Access version 2 (WPA2)


C.

Wireless Equivalence Protocol (WEP)


D.

Extensible Authentication Protocol (EAP)


Expert Solution
Questions # 99:

What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?

Options:

A.

Traffic Analysis


B.

Deep-Packet inspection


C.

Packet sampling


D.

Heuristic analysis


Expert Solution
Questions # 100:

Which of the following is a countermeasure to prevent unauthorized database access from web applications?

Options:

A.

Session encryption


B.

Removing all stored procedures


C.

Input sanitization


D.

Library control


Expert Solution
Viewing page 10 out of 15 pages
Viewing questions 91-100 out of questions