Go Back on 312-39 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

312-39 Practice Test


Page 7 out of 21 Pages

Which of the following process refers to the discarding of the packets at the routing level without informing the source that the data did not reach its intended recipient?


A.

Load Balancing


B.

Rate Limiting


C.

Black Hole Filtering


D.

Drop Requests





C.
  

Black Hole Filtering



Reference:
https://en.wikipedia.org/wiki/Black_hole_(networking)#:~:text=In-networking%2C-bl
ack% 20holes-refer,not-reach-its-intended-recipient.

Which of the following steps of incident handling and response process focus on limiting the scope and extent of an incident?


A.

Containment


B.

Data Collection


C.

Eradication


D.

Identification





A.
  

Containment



Which of the following tool is used to recover from web application incident?


A.

CrowdStrike FalconTM Orchestrator


B.

Symantec Secure Web Gateway


C.

Smoothwall SWG


D.

Proxy Workbench





B.
  

Symantec Secure Web Gateway



Which of the following fields in Windows logs defines the type of event occurred, such as Correlation Hint, Response Time, SQM, WDI Context, and so on?


A.

Keywords


B.

Task Category


C.

Level


D.

Source





A.
  

Keywords



Which of the following command is used to view iptables logs on Ubuntu and Debian distributions?


A.

$ tailf /var/log/sys/kern.log


B.

$ tailf /var/log/kern.log


C.

# tailf /var/log/messages


D.

# tailf /var/log/sys/messages





B.
  

$ tailf /var/log/kern.log



Reference: https://tecadmin.net/enable-logging-in-iptables-on-linux/


Page 7 out of 21 Pages
Previous