Online Access Free 312-50v8 Practice Test
| Exam Code: | 312-50v8 |
| Exam Name: | Certified Ethical Hacker v8 |
| Certification Provider: | EC-COUNCIL |
| Free Question Number: | 880 |
| Posted: | Dec 20, 2025 |
Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?
A company has hired a security administrator to maintain and administer Linux and Windows-based systems. Written in the nightly report file is the followinG.
Firewall log files are at the expected value of 4 MB. The current time is 12am. Exactly two hours later the size has decreased considerably. Another hour goes by and the log files have shrunk in size again.
Which of the following actions should the security administrator take?
Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)
