ECCouncil Related Exams
312-38 Exam
David, a network and system admin, encrypted all the files in a Windows system that supports NTFS file system using Encrypted File Systems (EFS). He then backed up the same files into another Windows
system that supports FAT file system. Later, he found that the backup files were not encrypted. What could be the reason for this?
Which of the following network monitoring techniques requires extra monitoring software or hardware?
Which of the following Wireshark filters allows an administrator to detect SYN/FIN DDoS attempt on
the network?