ECCouncil 312-38 Practice Test - Questions Answers, Page 12
List of questions
Related questions
Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall? Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are NOT true about the FAT16 file system? Each correct answer represents a complete solution. Choose all that apply.
FILL BLANK
Fill in the blank with the appropriate term. The ____________ is used for routing voice conversations over the Internet. It is also known by other names such as IP Telephony, Broadband Telephony, etc.
FILL BLANK
Fill in the blank with the appropriate term. The ___________ protocol is a feature of packet-based data transmission protocols. It is used to keep a record of the frame sequences sent and their respective acknowledgements received by both the users.
FILL BLANK
Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers.
Which of the following standards is an amendment to the original IEEE 802.11 and specifies security mechanisms for wireless networks?
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?
Which of the following is a non-profit organization that oversees the allocation of IP addresses, management of the DNS infrastructure, protocol parameter assignment, and root server system management?
With which of the following flag sets does the Xmas tree scan send a TCP frame to a remote device? Each correct answer represents a part of the solution.
Choose all that apply.
Network security is the specialist area, which consists of the provisions and policies adopted by the Network Administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and networkaccessible resources. For which of the following reasons is network security needed? Each correct answer represents a complete solution. Choose all that apply.
Question