How is application whitelisting different from application blacklisting?
A. It allows all applications other than the undesirable applications
B. It allows execution of trusted applications in a unified environment
C. It allows execution of untrusted applications in an isolated environment
D. It rejects all applications other than the allowed applications
Which of the following is a windows in-built feature that provides filesystem-level encryption in the OS (starting from Windows 2000). except the Home version of Windows?
A. Bit Locker
B. EFS
C. Disk Utility
D. FileVault
Which risk management phase helps in establishing context and quantifying risks?
A. Risk identification
B. Risk assessment
C. Risk review
D. Risk treatment
Which of following are benefits of using loT devices in loT-enabled environments?
A. loT device car be connected anytime
II . loT device can be connected at any place
III. loT devices connected to anything
B. I, II and III
C. I
D. II
E. I and II
A local bank wants to protect their cardholder data. Which standard should the bark comply with in order to ensure security of this data?
A. GDPR
B. HIPAA
C. SOX
D. PCI DSS
Which type of modulation technique is used in local area wireless networks (LAWNs)?
A. FHSS
B. OFDM
C. DSSS
D. MIMO-OFDM
Maximus Tech Is a multinational company that uses Cisco ASA Firewalls for their systems. Jason is the one of the members of the team that checks the logs at Maximus Tech. As a part of his job. he is going through me logs and he came across a firewall log that looks like this:
May 06 2018 21:27:27 asa 1: % ASA -6-11008: User enable_16' executed the 'configure term' command
Based on the security level mentioned in the log, what did Jason understand about the description of this message?
A. Normal but significant message
B. Informational message
C. Critical condition message
D. Warning condition message
What should an administrator do while installing a sniffer on a system to listen to all data transmitted over the network?
A. Set the system's NIC to managed mode
B. Set the system's NIC to master mode
C. Set the system's NIC to ad-hoc mode
D. Set the system's NIC to promiscuous mode
According to standard loT security practice, loT Gateway should be connected to a __________ .
A. Border router
B. Secure router
C. Pouter that is connected to internal servers
D. Router that is connected to other subnets
Which type of information security policy addresses the implementation and configuration of technology and user behavior?
A. Enterprise information security policy
B. Acceptable use policy
C. System specific security policy
D. Issue-specific security policy
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.