ECcouncil 312 38
Q: 1
Geon Solutions INC., had only 10 employees when it started. But as business grew, the organization
had to increase the amount of staff. The network administrator is finding it difficult to accommodate
an increasing
number of employees in the existing network topology. So the organization is planning to implement
a new topology where it will be easy to accommodate an increasing number of employees. Which
network topology
will help the administrator solve the problem of needing to add new employees and expand?
Options
Q: 2
Which of the following provides enhanced password protection, secured loT connections, and
encompasses stronger encryption techniques?
Options
Q: 3
If a network is at risk from unskilled individuals, what type of threat is this?
Options
Q: 4
Larry is responsible for the company's network consisting of 300 workstations and 25 servers. After
using a hosted email service for a year, the company wants to control the email internally. Larry likes
this idea because
it will give him more control over the email. Larry wants to purchase a server for email but does not
want the server to be on the internal network due to the potential to cause security risks. He decides
to place the server
outside of the company's internal firewall. There is another firewall connected directly to the
Internet that will protect traffic from accessing the email server. The server will be placed between
the two firewalls. What
logical area is Larry putting the new email server into?
Options
Q: 5
Will is working as a Network Administrator. Management wants to maintain a backup of all the
company data as soon as it starts operations. They decided to use a RAID backup storage technology
for their data backup
plan. To implement the RAID data backup storage, Will sets up a pair of RAID disks so that all the data
written to one disk is copied automatically to the other disk as well. This maintains an additional
copy of the dat
a.
Which RAID level is used here?
Options
Q: 6
Daniel who works as a network administrator has just deployed an in his organizations network. He
wants to calculate the False Positive rate for his implementation. Which of the following formulas
will he use to calculate the False Positive rate?
Options
Q: 7
Which wireless networking topology setup requires same channel name and SSID?
Options
Q: 8
The SOC manager is reviewing logs in AlienVault USM to investigate an intrusion on the network.
Which CND approach is being used?
Options
Q: 9
The IR team and the network administrator have successfully handled a malware incident on the
network. The team is now preparing countermeasure guideline to avoid a future occurrence of the
malware incident.
Which of the following countermeasure(s) should be added to deal with future malware incidents?
(Select all that apply)
Options
Q: 10
Which encryption algorithm h used by WPA5 encryption?
Options
Question 1 of 10