ECCouncil 312-38 Practice Test - Questions Answers
List of questions
Related questions
Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?
Which of the following is a communication protocol that multicasts messages and information among all member devices in an IP multicast group?
In which of the following attacks do computers act as zombies and work together to send out bogus messages, thereby increasing the amount of phony traffic?
Attacks are classified into which of the following? Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are true about an IPv6 network? Each correct answer represents a complete solution. Choose all that apply.
Which of the following transmission modes of communication is one-way?
Which of the following is designed to detect unwanted changes by observing the flame of the environment associated with combustion?
Which of the following features is used to generate spam on the Internet by spammers and worms?
Which of the following tools is described below? It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.
Which of the following IP class addresses are not allotted to hosts? Each correct answer represents a complete solution. Choose all that apply.
Question