ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a firewall that keeps track of the state of network connections traveling across it?

A.
Stateful firewall
A.
Stateful firewall
Answers
B.
Stateless packet filter firewall
B.
Stateless packet filter firewall
Answers
C.
Circuit-level proxy firewall
C.
Circuit-level proxy firewall
Answers
D.
Application gateway firewall
D.
Application gateway firewall
Answers
Suggested answer: A

Explanation:

A stateful firewall is a firewall that keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known connection state will be allowed by the firewall; others will be rejected. Answer option B is incorrect. A stateless packet filter firewall allows direct connections from the external network to hosts on the internal network and is included with router configuration software or with Open Source operating systems.

Answer option C is incorrect. It applies security mechanisms when a TCP or UDP connection is established.

Answer option D is incorrect. An application gateway firewall applies security mechanisms to specific applications, such as FTP and Telnet servers.

FILL BLANK

Fill in the blank with the appropriate term. ______________ encryption is a type of encryption that uses two keys, i.e., a public key and a private key pair for data encryption. It is also known as public key encryption.

A.
Asymmetric
A.
Asymmetric
Answers
Suggested answer: A

Explanation:

Asymmetric encryption is a type of encryption that uses two keys, i.e., a public key and a private key pair for data encryption. The public key is available to everyone, while the private or secret key is available only to the recipient of the message. For example, when a user sends a message or data to another user, the sender uses the public key to encrypt the data. The receiver uses his private key to decrypt the data.

FILL BLANK

Fill in the blank with the appropriate term. ______________is a protocol used to synchronize the timekeeping among the number of distributed time servers and clients.

A.
NTP
A.
NTP
Answers
Suggested answer: A

Explanation:

Network Time Protocol (NTP) is used to synchronize the timekeeping among the number of distributed time servers and clients. It is used for the time management in a large and diverse network that contains many interfaces. In this protocol, servers define the time, and clients have to be synchronized with the defined time. These clients can choose the most reliable source of time defined from the several NTP servers for their information transmission.

FILL BLANK

Fill in the blank with the appropriate term. The ______________is a communication protocol that communicates information between the network routers and the multicast end stations.

A.
IGMP
A.
IGMP
Answers
Suggested answer: A

Explanation:

The Internet Group Management Protocol (IGMP) is a communication protocol that communicates information between the network routers and the multicast end stations. It allows the receivers to request a multicast data stream from a specific group address. However, multicast traffic is sent to a single MAC address but is processed by multiple hosts. The IGMP allows an end station to connect to a multicast group and leave it, while being connected to the group address. It can be effectively used for gaming and showing online videos. Although it does not actually act as a transport protocol, it operates above the network layer. It is analogous to ICMP for unicast connections. It is susceptible to some attacks, so firewalls commonly allow the user to disable it if not needed.

Which of the following can be performed with software or hardware devices in order to record everything a person types using his or her keyboard?

A.
Warchalking
A.
Warchalking
Answers
B.
Keystroke logging
B.
Keystroke logging
Answers
C.
War dialing
C.
War dialing
Answers
D.
IRC bot
D.
IRC bot
Answers
Suggested answer: B

Explanation:

Keystroke logging is a method of logging and recording user keystrokes. It can be performed with software or hardware devices. Keystroke logging devices can record everything a person types using his or her keyboard, such as to measure employee's productivity on certain clerical tasks. These types of devices can also be used to get usernames, passwords, etc.

Answer option C is incorrect. War dialing is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, BBS systems, and fax machines.

Hackers use the resulting lists for various purposes, hobbyists for exploration, and crackers (hackers that specialize in computer security) for password guessing.

Answer option A is incorrect. Warchalking is the drawing of symbols in public places to advertise an open Wi-Fi wireless network. Having found a Wi-Fi node, the warchalker draws a special symbol on a nearby object, such as a wall, the pavement, or a lamp post. The name warchalking is derived from the cracker terms war dialing and war driving.

Answer option D is incorrect. An Internet Relay Chat (IRC) bot is a set of scripts or an independent program that connects to Internet Relay Chat as a client, and so appears to other IRC users as another user. An IRC bot differs from a regular client in that instead of providing interactive access to IRC for a human user, it performs automated functions.

FILL BLANK

Fill in the blank with the appropriate term.

A ______________ is a translation device or service that is often controlled by a separate Media Gateway Controller, which provides the call control and signaling functionality.

A.
Media gateway
A.
Media gateway
Answers
Suggested answer: A

Explanation:

A Media gateway is a translation device or service that converts digital media streams between disparate telecommunications networks such as PSTN, SS7,

Next Generation Networks (2G, 2.5G and 3G radio access networks) or PBX. Media gateways enable multimedia communications across Next Generation

Networks over multiple transport protocols such as Asynchronous Transfer Mode (ATM) and Internet Protocol (IP). Because the media gateway connects different types of networks, one of its main functions is to convert between different transmission and coding techniques. Media streaming functions such as echo cancellation, DTMF, and tone sender are also located in the media gateway. Media gateways are often controlled by a separate Media Gateway Controller, which provides the call control and signaling functionality.

Which of the following is a mechanism that helps in ensuring that only the intended and authorized recipients are able to read data?

A.
Integrity
A.
Integrity
Answers
B.
Data availability
B.
Data availability
Answers
C.
Confidentiality
C.
Confidentiality
Answers
D.
Authentication
D.
Authentication
Answers
Suggested answer: C

Explanation:

Confidentiality is a mechanism that ensures that only the intended and authorized recipients are able to read data. The data is so encrypted that even if an unauthorized user gets access to it, he will not get any meaning out of it.

Answer option A is incorrect. In information security, integrity means that data cannot be modified without authorization. This is not the same thing as referential integrity in databases. Integrity is violated when an employee accidentally or with malicious intent deletes important data files, when a computer virus infects a computer, when an employee is able to modify his own salary in a payroll database, when an unauthorized user vandalizes a web site, when someone is able to cast a very large number of votes in an online poll, and so on. There are many ways in which integrity could be violated without malicious intent. In the simplest case, a user on a system could mistype someone's address. On a larger scale, if an automated process is not written and tested correctly, bulk updates to a database could alter data in an incorrect way, leaving the integrity of the data compromised. Information security professionals are tasked with finding ways to implement controls that prevent errors of integrity.

Answer option B is incorrect. Data availability is one of the security principles that ensures that the data and communication services will be available for use when needed (expected). It is a method of describing products and services availability by which it is ensured that data continues to be available at a required level of performance in situations ranging from normal to disastrous. Data availability is achieved through redundancy, which depends upon where the data is stored and how it can be reached.

Answer option D is incorrect. Authentication is the act of establishing or confirming something (or someone) as authentic, i.e., the claims made by or about the subject are true ("authentification" is a variant of this word).

Which of the following help in estimating and totaling up the equivalent money value of the benefits and costs to the community of projects for establishing whether they are worthwhile? Each correct answer represents a complete solution. Choose all that apply.

A.
Business Continuity Planning
A.
Business Continuity Planning
Answers
B.
Benefit-Cost Analysis
B.
Benefit-Cost Analysis
Answers
C.
Disaster recovery
C.
Disaster recovery
Answers
D.
Cost-benefit analysis
D.
Cost-benefit analysis
Answers
Suggested answer: B, D

Explanation:

Cost-benefit analysis is a process by which business decisions are analyzed. It is used to estimate and total up the equivalent money value of the benefits and costs to the community of projects for establishing whether they are worthwhile. It is a term that refers both to:

helping to appraise, or assess, the case for a project, program, or policy proposal; an approach to making economic decisions of any kind. Under both definitions, the process involves, whether explicitly or implicitly, weighing the total expected costs against the total expected benefits of one or more actions in order to choose the best or most profitable option. The formal process is often referred to as either CBA (Cost-Benefit Analysis) or BCA (Benefit-Cost Analysis).

Answer option A is incorrect. Business Continuity Planning (BCP) is the creation and validation of a practiced logistical plan that defines how an organization will recover and restore partially or completely interrupted critical (urgent) functions within a predetermined time after a disaster or extended disruption. The logistical plan is called a Business Continuity Plan.

Answer option C is incorrect. Disaster recovery is the process, policies, and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.

Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption of applications, data, hardware, communications (such as networking) and other IT infrastructure. A business continuity plan (BCP) includes planning for non-IT related aspects such as key personnel, facilities, crisis communication and reputation protection, and should refer to the disaster recovery plan (DRP) for IT related infrastructure recovery / continuity.

Which of the following steps will NOT make a server fault tolerant? Each correct answer represents a complete solution. (Choose two.)

A.
Adding a second power supply unit
A.
Adding a second power supply unit
Answers
B.
Performing regular backup of the server
B.
Performing regular backup of the server
Answers
C.
Adding one more same sized disk as mirror on the server
C.
Adding one more same sized disk as mirror on the server
Answers
D.
Implementing cluster servers' facility
D.
Implementing cluster servers' facility
Answers
E.
Encrypting confidential data stored on the server
E.
Encrypting confidential data stored on the server
Answers
Suggested answer: B, E

Explanation:

Encrypting confidential data stored on the server and performing regular backup will not make the server fault tolerant.

Fault tolerance is the ability to continue work when a hardware failure occurs on a system. A fault-tolerant system is designed from the ground up for reliability by building multiples of all critical components, such as CPUs, memories, disks and power supplies into the same computer. In the event one component fails, another takes over without skipping a beat. Answer options A, C, and D are incorrect. The following steps will make the server fault tolerant:

Adding a second power supply unit Adding one more same sized disk as a mirror on the server implementing cluster servers facility

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows: It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. It is commonly used for the following purposes:

A.
War driving
A.
War driving
Answers
B.
Detecting unauthorized access points
B.
Detecting unauthorized access points
Answers
C.
Detecting causes of interference on a WLAN
C.
Detecting causes of interference on a WLAN
Answers
D.
WEP ICV error tracking
D.
WEP ICV error tracking
Answers
E.
Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as __________.
E.
Making Graphs and Alarms on 802.11 Data, including Signal Strength This tool is known as __________.
Answers
F.
Kismet
F.
Kismet
Answers
G.
Absinthe
G.
Absinthe
Answers
H.
THC-Scan
H.
THC-Scan
Answers
I.
NetStumbler
I.
NetStumbler
Answers
Suggested answer: D

Explanation:

NetStumbler is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of NetStumbler are as follows: It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. It is commonly used for the following purposes: a.War driving

b.Detecting unauthorized access points

c.Detecting causes of interference on a WLAN

d.WEP ICV error tracking

e.Making Graphs and Alarms on 802.11 Data, including Signal Strength

Answer option A is incorrect. Kismet is an IEEE 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Answer option C is incorrect.

THC-Scan is a war-dialing tool.

Answer option B is incorrect. Absinthe is an automated SQL injection tool.

Total 613 questions
Go to page: of 62