ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 28

Question list
Search
Search

Related questions











Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?

A.
SuperScan
A.
SuperScan
Answers
B.
Netscan
B.
Netscan
Answers
C.
Hping
C.
Hping
Answers
D.
Nmap
D.
Nmap
Answers
Suggested answer: A

Which of the following is a method of authentication that uses physical characteristics?

A.
COMSEC
A.
COMSEC
Answers
B.
ACL
B.
ACL
Answers
C.
Honeypot
C.
Honeypot
Answers
D.
Biometrics
D.
Biometrics
Answers
Suggested answer: D

Which of the following is a mandatory password-based and key-exchange authentication protocol?

A.
PPP
A.
PPP
Answers
B.
CHAP
B.
CHAP
Answers
C.
VRRP
C.
VRRP
Answers
D.
DH-CHAP
D.
DH-CHAP
Answers
Suggested answer: D

Which of the following is susceptible to a birthday attack?

A.
Authentication
A.
Authentication
Answers
B.
Integrity
B.
Integrity
Answers
C.
Authorization
C.
Authorization
Answers
D.
Digital signature
D.
Digital signature
Answers
Suggested answer: D

Which of the following wireless networks provides connectivity over distance up to 20 feet?

A.
WMAN
A.
WMAN
Answers
B.
WPAN
B.
WPAN
Answers
C.
WLAN
C.
WLAN
Answers
D.
WWAN
D.
WWAN
Answers
Suggested answer: B

Which of the following networks interconnects devices centered on an individual person's workspace?

A.
WLAN
A.
WLAN
Answers
B.
WPAN
B.
WPAN
Answers
C.
WWAN
C.
WWAN
Answers
D.
WMAN
D.
WMAN
Answers
Suggested answer: B

Which of the following is a symmetric 64-bit block cipher that can support key lengths up to 448 bits?

A.
HAVAL
A.
HAVAL
Answers
B.
BLOWFISH
B.
BLOWFISH
Answers
C.
IDEA
C.
IDEA
Answers
D.
XOR
D.
XOR
Answers
Suggested answer: B

Which of the following protocols is used to exchange encrypted EDI messages via email?

A.
S/MIME
A.
S/MIME
Answers
B.
MIME
B.
MIME
Answers
C.
HTTP
C.
HTTP
Answers
D.
HTTPS
D.
HTTPS
Answers
Suggested answer: A

Which of the following are provided by digital signatures?

A.
Identification and validation
A.
Identification and validation
Answers
B.
Authentication and identification
B.
Authentication and identification
Answers
C.
Integrity and validation
C.
Integrity and validation
Answers
D.
Security and integrity
D.
Security and integrity
Answers
Suggested answer: B

Which of the following is a passive attack?

A.
Unauthorized access
A.
Unauthorized access
Answers
B.
Traffic analysis
B.
Traffic analysis
Answers
C.
Replay attack
C.
Replay attack
Answers
D.
Session hijacking
D.
Session hijacking
Answers
Suggested answer: B
Total 613 questions
Go to page: of 62