ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 21

Add to Whishlist

List of questions

Question 201

Report Export Collapse

Which of the following layers of the OSI model provides end-to-end connections and reliability?

Become a Premium Member for full access
  Unlock Premium Member

Question 202

Report Export Collapse

In an Ethernet peer-to-peer network, which of the following cables is used to connect two computers, using RJ-45 connectors and Category-5 UTP cable?

Become a Premium Member for full access
  Unlock Premium Member

Question 203

Report Export Collapse

You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases. The email header of the suspicious email is given below:

ECCouncil 312-38 image Question 203 23491 09182024184737000000

What is the IP address of the sender of this email?

Become a Premium Member for full access
  Unlock Premium Member

Question 204

Report Export Collapse

Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 205

Report Export Collapse

Which of the following is a worldwide organization that aims to establish, refine, and promote Internet security standards?

Become a Premium Member for full access
  Unlock Premium Member

Question 206

Report Export Collapse

Which of the following statements are TRUE about Demilitarized zone (DMZ)? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 207

Report Export Collapse

Which of the following network scanning tools is a TCP/UDP port scanner that works as a ping sweeper and hostname resolver?

Become a Premium Member for full access
  Unlock Premium Member

Question 208

Report Export Collapse

Which of the following is a network layer protocol used to obtain an IP address for a given hardware (MAC) address?

Become a Premium Member for full access
  Unlock Premium Member

Question 209

Report Export Collapse

FILL BLANK

Fill in the blank with the appropriate term.

A ______________ is a term in computer terminology used for a trap that is set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.

Become a Premium Member for full access
  Unlock Premium Member

Question 210

Report Export Collapse

FILL BLANK

Fill in the blank with the appropriate term.

A ______________ gateway is a type of network gateway that provides the added capability to control devices across the Internet.

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions