Which of the following is true regarding any attack surface?
A. Decrease in vulnerabilities decreases the attack surface
B. Increase in vulnerabilities decreases the attack surface
C. Decrease in risk exposures increases the attack surface
D. Decrease in vulnerabilities increases the attack surface
Which type of attack is used to hack an IoT device and direct large amounts of network traffic toward a web server, resulting in overloading the server with connections and preventing any new connections?
A. XSS
B. DDoS
C. XCRF
D. Sniffing
Which of the following security models enable strict identity verification for every user or device attempting to access the network resources?
I. Zero-trust network model
II.
Castle-and-Moat model
A.
Both I and II
B.
I only
C.
II only
D.
None
If Myron, head of network defense at Cyberdyne, wants to change the default password policy settings on the company's Linux systems, which directory should he access?
A. /etc/logrotate.conf
B. /etc/hosts.allow
C. /etc/crontab
D. /etc/login.defs
Which of the Windows security component is responsible for controlling access of a user to Windows resources?
A. Network Logon Service (Netlogon)
B. Security Accounts Manager (SAM)
C. Security Reference Monitor (SRM)
D. Local Security Authority Subsystem (LSASS)
A company wants to implement a data backup method that allows them to encrypt the data ensuring its security as well as access it at any time and from any location. What is the appropriate backup method that should be implemented?
A. Cloud backup
B. Offsite backup
C. Hot site backup
D. Onsite backup
Which of the following helps in viewing account activity and events for supported services made by AWS?
A. AWS CloudFormation
B. AWS Certificate Manager
C. AWS CloudHSM
D. AWS CloudTrial
Who oversees all the incident response activities in an organization and is responsible for all actions of the IR team and IR function?
A. IR officer
B. Attorney
C. IR custodians
D. PR specialist
Hacktivists are threat actors, who can be described as __________ .
A. People motivated by religious beliefs
B. Disgruntled/terminated employees
C. People motivated by monetary gams
D. People having political or social agenda
Which among the following options represents professional hackers with an aim of attacking systems for profit?
A. Script kiddies
B. Organized hackers
C. Hacktivists
D. Cyber terrorists
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.