Month End Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Effective Study Techniques for the ECCouncil 312-38 Exam

Questions 91

John has implemented________in the network to restrict the limit of public IP addresses in his organization and to enhance the firewall filtering technique.

Options:
A.

DMZ

B.

Proxies

C.

VPN

D.

NAT

ECCouncil 312-38 Premium Access
Questions 92

Peter works as a network administrator at an IT company. He wants to avoid exploitation of the cloud, particularly Azure services. Which of the following is a group of PowerShell scripts designed to help the network administrator understand how attacks happen and help them protect the cloud?

Options:
A.

MicroBurst

B.

POSH -Sysmon

C.

SecurityPolicyDsc

D.

Sysmon

Questions 93

Which of the following standards does a cloud service provider has to comply with, to protect the privacy of its customer’s personal information?

Options:
A.

ISO/IEC 27018

B.

ISO/IEC 27019

C.

ISO/IEC 27020

D.

ISO/IEC 27021

Questions 94

Which type of attack is used to hack an IoT device and direct large amounts of network traffic toward a web server, resulting in overloading the server with connections and preventing any new connections?

Options:
A.

XSS

B.

DDoS

C.

XCRF

D.

Sniffing

Questions 95

Which command list all ports available on a server?

Options:
A.

sudo apt netstate -Is tunlp

B.

sudo ntstat -Is tunlp

C.

sudo apt nst -tunlp

D.

sudo netstat -tunlp

Questions 96

Which phase of vulnerability management deals with the actions taken for correcting the discovered vulnerability?

Options:
A.

Mitigation

B.

Assessment

C.

Remediation

D.

Verification

Questions 97

Which of the following things need to be identified during attack surface visualization?

Options:
A.

Attacker’s tools, techniques, and procedures

B.

Authentication, authorization, and auditing in networks

C.

Regulatory frameworks, standards and, procedures for organizations

D.

Assets, topologies, and policies of the organization

Questions 98

John has successfully remediated the vulnerability of an internal application that could have caused a threat to the network. He is scanning the application for the existence of a remediated vulnerability, this process is

called a________and it has to adhere to the_________

Options:
A.

Verification, Security Policies

B.

Mitigation, Security policies

C.

Vulnerability scanning, Risk Analysis

D.

Risk analysis, Risk matrix

Questions 99

Which of the following provides a set of voluntary recommended cyber security features to include in network-capable loT devices?

Options:
A.

GCMA

B.

FCMA

C.

NIST

D.

GLBA

Questions 100

As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's_________integrity check mechanism provides security against a replay attack

Options:
A.

CBC-32

B.

CRC-MAC

C.

CRC-32

D.

CBC-MAC