ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 29

Question list
Search
Search

Related questions











Which of the following is a malicious program that looks like a normal program?

A.
Impersonation
A.
Impersonation
Answers
B.
Worm
B.
Worm
Answers
C.
Virus
C.
Virus
Answers
D.
Trojan horse
D.
Trojan horse
Answers
Suggested answer: D

Which of the following is an IPSec protocol that can be used alone in combination with Authentication Header (AH)?

A.
L2TP
A.
L2TP
Answers
B.
PPTP
B.
PPTP
Answers
C.
ESP
C.
ESP
Answers
D.
PPP
D.
PPP
Answers
Suggested answer: C

Which of the following attacks combines dictionary and brute force attacks?

A.
Replay attack
A.
Replay attack
Answers
B.
Man-in-the-middle attack
B.
Man-in-the-middle attack
Answers
C.
Hybrid attack
C.
Hybrid attack
Answers
D.
Phishing attack
D.
Phishing attack
Answers
Suggested answer: C

Which of the following attacks comes under the category of an active attack?

A.
Replay attack
A.
Replay attack
Answers
B.
Wireless footprinting
B.
Wireless footprinting
Answers
C.
Passive Eavesdropping
C.
Passive Eavesdropping
Answers
D.
Traffic analysis
D.
Traffic analysis
Answers
Suggested answer: A

Which of the following encryption techniques do digital signatures use?

A.
MD5
A.
MD5
Answers
B.
RSA
B.
RSA
Answers
C.
Blowfish
C.
Blowfish
Answers
D.
IDEA
D.
IDEA
Answers
Suggested answer: A

Which of the following header fields in TCP/IP protocols involves Ping of Death attack?

A.
SMTP header field
A.
SMTP header field
Answers
B.
TCP header field
B.
TCP header field
Answers
C.
IP header field
C.
IP header field
Answers
D.
UDP header field
D.
UDP header field
Answers
Suggested answer: B

Which of the following protocols is used for E-mail?

A.
TELNET
A.
TELNET
Answers
B.
MIME
B.
MIME
Answers
C.
SSH
C.
SSH
Answers
D.
SMTP
D.
SMTP
Answers
Suggested answer: D

Which of the following modems offers wireless communication under water?

A.
Controllerless modem
A.
Controllerless modem
Answers
B.
Short haul modem
B.
Short haul modem
Answers
C.
Acoustic modem
C.
Acoustic modem
Answers
D.
Optical modem
D.
Optical modem
Answers
Suggested answer: C

Which of the following protocols is used by the Remote Authentication Dial In User Service (RADIUS) client/server protocol for data transmission?

A.
DCCP
A.
DCCP
Answers
B.
FTP
B.
FTP
Answers
C.
FCP
C.
FCP
Answers
D.
UDP
D.
UDP
Answers
Suggested answer: D

Which of the following applications is used for the statistical analysis and reporting of the log files?

A.
Sawmill
A.
Sawmill
Answers
B.
Sniffer
B.
Sniffer
Answers
C.
Snort
C.
Snort
Answers
D.
jplag
D.
jplag
Answers
Suggested answer: A
Total 613 questions
Go to page: of 62