ECCouncil 312-38 Practice Test - Questions Answers, Page 3
List of questions
Related questions
FILL BLANK
Fill in the blank with the appropriate term. A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
Which of the following OSI layers establishes, manages, and terminates the connections between the local and remote applications?
Adam, a malicious hacker, is sniffing an unprotected Wi-FI network located in a local store with Wireshark to capture hotmail e-mail traffic. He knows that lots of people are using their laptops for browsing the Web in the store. Adam wants to sniff their e-mail messages traversing the unprotected Wi-Fi network. Which of the following Wireshark filters will Adam configure to display only the packets with hotmail email messages?
Which of the following are the distance-vector routing protocols? Each correct answer represents a complete solution. Choose all that apply.
With which of the following forms of acknowledgment can the sender be informed by the data receiver about all segments that have arrived successfully?
FILL BLANK
Fill in the blank with the appropriate term. ______________is a method for monitoring the e-mail delivery to the intended recipient.
Question