Syslog and SNMP are the two main _______ protocols through which log records are transferred.
A. Pull-based
B. Push-based
C. Host-based
D. Network-based
If an organization has decided to consume PaaS Cloud service model, then identify the organization's responsibility that they need to look after based on shared responsibility model.
A. Data, interfaces, application, etc.
B. Data, interfaces, application, middleware, OS, VM, virtual network, etc.
C. Data, interfaces, application, middleware, OS, VM, virtual network, hypervisors, processing and memory, data storage, network interfaces, facilities and data centers, etc.
D. Data, interfaces, etc.
Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?
A. Shared Responsibility Model for Container Services
B. Shared Responsibility Model for Infrastructure Services
C. Shared Responsibility Model for Abstract Services
D. Shared Responsibility Model for Storage Services
Docker provides Platform-as-a-Service (PaaS) through ________ and delivers containerized software packages.
A. Server-level virtualization
B. Network-level virtualization
C. OS-level virtualization
D. Storage-level virtualization
Mark is monitoring the network traffic on his organization's network. He wants to detect TCP and UDP ping sweeps on his network. Which type of filter will be used to detect this?
A. tcp.dstport==7 and udp.srcport==7
B. tcp.srcport==7 and udp.dstport==7
C. tcp.dstport==7 and udp.dstport==7
D. tcp.srcport==7 and udp.srcport==7
John has implemented _________ in the network to restrict the number of public IP addresses in his organization and to enhance the firewall filtering technique.
A. VPN
B. Proxies
C. DMZ
D. NAT
Which of the following creates passwords for individual administrator accounts and stores them in Windows AD?
A. LSASS
B. SRM
C. SAM
D. LAPS
Which of the following statements holds true in terms of virtual machines?
A. Hardware-level virtualization takes place in VMs
B. OS-level virtualization takes place in VMs
C. All VMs share the host OS
D. VMs are light weight than containers
In MacOS, how can the user implement disk encryption?
A. By enabling BitLocker feature
B. By executing dm-crypt command
C. By turning on Device Encryption feature
D. By enabling FileVault feature
Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:
A. Cloud to service attack surface
B. User to service attack surface
C. User to cloud attack surface
D. Cloud to user attack surface
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.