ECCouncil 312-38 Practice Test - Questions Answers, Page 2
List of questions
Related questions
A war dialer is a tool that is used to scan thousands of telephone numbers to detect vulnerable modems. It provides an attacker unauthorized access to a computer. Which of the following tools can an attacker use to perform war dialing? Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols is used to share information between routers to transport IP Multicast packets among networks?
Which of the following is a technique for gathering information about a remote network protected by a firewall?
Which of the following is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end-user client applications?
Which of the following attacks is a class of brute force attacks that depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations?
Which of the following is a digital telephone/telecommunication network that carries voice, data, and video over an existing telephone network infrastructure?
FILL BLANK
Fill in the blank with the appropriate term.
______________ is a prime example of a high-interaction honeypot.
FILL BLANK
Fill in the blank with the appropriate term.
______________ is an enumeration technique used to glean information about computer systems on a network and the services running its open ports.
John works as a C programmer. He develops the following C program:
His program is vulnerable to a __________ attack.
FILL BLANK
Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient.
Question