ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 3

List of questions

Question 21

Report Export Collapse

FILL BLANK

Fill in the blank with the appropriate term. A _______________device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.

biometric
biometric
Suggested answer: A
Explanation:

A biometric device is used for uniquely recognizing humans based upon one or more intrinsic, physical, or behavioral traits.

Biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric characteristics can be divided into two main classes:

1.Physiological: These devices are related to the shape of the body. These are not limited to the fingerprint, face recognition, DNA, hand and palm geometry, and iris recognition, which has largely replaced the retina and odor/scent.

2.Behavioral: These are related to the behavior of a person. They are not limited to the typing rhythm, gait, and voice.

asked 18/09/2024
San Min Oo
49 questions

Question 22

Report Export Collapse

Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.

Wireless sniffer
Wireless sniffer
Spectrum analyzer
Spectrum analyzer
Protocol analyzer
Protocol analyzer
Performance Monitor
Performance Monitor
Suggested answer: A, C
Explanation:

Protocol analyzer (also known as a network analyzer, packet analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes and analyzes its content according to the appropriate RFC or other specifications.

Answer option D is incorrect. Performance Monitor is used to get statistical information about the hardware and software components of a server.

Answer option B is incorrect. A spectrum analyzer, or spectral analyzer, is a device that is used to examine the spectral composition of an electrical, acoustic, or optical waveform. It may also measure the power spectrum.

asked 18/09/2024
Gage Adams
37 questions

Question 23

Report Export Collapse

In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.

The router does not have a configuration file.
The router does not have a configuration file.
There is a need to set operating parameters.
There is a need to set operating parameters.
The user interrupts the boot sequence.
The user interrupts the boot sequence.
The router does not find a valid operating system image.
The router does not find a valid operating system image.
Suggested answer: C, D
Explanation:

The system enters ROM monitor mode if the router does not find a valid operating system image, or if a user interrupts the boot sequence. From ROM monitor mode, a user can boot the device or perform diagnostic tests. Answer option A is incorrect. If the router does not have a configuration file, it will automatically enter Setup mode when the user switches it on. Setup mode creates an initial configuration. Answer option B is incorrect. Privileged EXEC is used for setting operating parameters.

asked 18/09/2024
Oren Dahan
50 questions

Question 24

Report Export Collapse

Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?

IGMP
IGMP
ICMP
ICMP
EGP
EGP
OSPF
OSPF
Suggested answer: C
Explanation:

EGP stands for Exterior Gateway Protocol. It is used for exchanging routing information between two gateways in a network of autonomous systems. This protocol depends upon periodic polling with proper acknowledgements to confirm that network connections are up and running, and to request for routing updates. Each router requests its neighbor at an interval of 120 to 480 seconds, for sending the routing table updates. The neighbor host then responds by sending its routing table. EGP-2 is the latest version of EGP.

Answer option B is incorrect. Internet Control Message Protocol (ICMP) is a maintenance protocol that allows routers and host computers to swap basic control information when data is sent from one computer to another. It is generally considered a part of the IP layer. It allows the computers on a network to share error and status information. An ICMP message, which is encapsulated within an IP datagram, is very useful to troubleshoot the network connectivity and can be routed throughout the Internet.

Answer option A is incorrect. Internet Group Management Protocol (IGMP) is a communication protocol that multicasts messages and information among all member devices in an IP multicast group. However, multicast traffic is sent to a single MAC address but is processed by multiple hosts. It can be effectively used for gaming and showing online videos. IGMP is vulnerable to network attacks.

Answer option D is incorrect. Open Shortest Path First (OSPF) is a routing protocol that is used in large networks. Internet Engineering Task Force (IETF) designates OSPF as one of the Interior Gateway Protocols. A host uses OSPF to obtain a change in the routing table and to immediately multicast updated information to all the other hosts in the network.

asked 18/09/2024
Carlos Almeida Fernandes
39 questions

Question 25

Report Export Collapse

Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?

Sequence Number
Sequence Number
Header Length
Header Length
Acknowledgment Number
Acknowledgment Number
Source Port Address
Source Port Address
Suggested answer: D
Explanation:

Source Port Address is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment.

Answer option C is incorrect. This is a 32-bit field that identifies the byte number that the sender of the segment is expecting to receive from the receiver.

Answer option B is incorrect. This is a 4-bit field that defines the 4-byte words in the TCP header. The header length can be between 20 and 60 bytes. Therefore, the value of this field can be between 5 and 15. Answer option A is incorrect. This is a 32-bit field that identifies the number assigned to the first byte of data contained in the segment.

asked 18/09/2024
Tudor Voicu
39 questions

Question 26

Report Export Collapse

Which of the following OSI layers establishes, manages, and terminates the connections between the local and remote applications?

Data Link layer
Data Link layer
Network layer
Network layer
Application layer
Application layer
Session layer
Session layer
Suggested answer: D
Explanation:

The session layer of the OSI/RM controls the dialogues (connections) between computers. It establishes, manages and terminates the connections between the local and remote application. It provides for full-duplex, half-duplex, or simplex operation, and establishes checkpointing, adjournment, termination, and restart procedures. The OSI model made this layer responsible for graceful close of sessions, which is a property of the Transmission Control Protocol, and also for session checkpointing and recovery, which is not usually used in the Internet Protocol Suite. The Session Layer is commonly implemented explicitly in application environments that use remote procedure calls.

Answer option C is incorrect. The Application Layer of TCP/IP model refers to the higher-level protocols used by most applications for network communication.

Examples of application layer protocols include the File Transfer Protocol (FTP) and the Simple Mail Transfer Protocol (SMTP). Data coded according to application layer protocols are then encapsulated into one or more transport layer protocols, which in turn use lower layer protocols to affect actual data transfer.

Answer option A is incorrect. The Data Link Layer is Layer 2 of the seven-layer OSI model of computer networking. It corresponds to or is part of the link layer of the TCP/IP reference model. The Data Link Layer is the protocol layer which transfers data between adjacent network nodes in a wide area network or between nodes on the same local area network segment. The Data Link Layer provides the functional and procedural means to transfer data between network entities and might provide the means to detect and possibly correct errors that may occur in the Physical Layer. Examples of data link protocols are Ethernet for local area networks (multi-node), the Point-to-Point Protocol (PPP), HDLC, and ADCCP for point-to-point (dual-node) connections.

Answer option B is incorrect. The network layer controls the operation of subnet, deciding which physical path the data should take, based on network conditions, priority of service, and other factors. Routers work on the Network layer of the OSI stack.

asked 18/09/2024
Tom Ogan
37 questions

Question 27

Report Export Collapse

Adam, a malicious hacker, is sniffing an unprotected Wi-FI network located in a local store with Wireshark to capture hotmail e-mail traffic. He knows that lots of people are using their laptops for browsing the Web in the store. Adam wants to sniff their e-mail messages traversing the unprotected Wi-Fi network. Which of the following Wireshark filters will Adam configure to display only the packets with hotmail email messages?

(http = "login.pass.com") && (http contains "SMTP")
(http = "login.pass.com") && (http contains "SMTP")
(http contains "email") && (http contains "hotmail")
(http contains "email") && (http contains "hotmail")
(http contains "hotmail") && (http contains "Reply-To")
(http contains "hotmail") && (http contains "Reply-To")
(http = "login.passport.com") && (http contains "POP3")
(http = "login.passport.com") && (http contains "POP3")
Suggested answer: C
Explanation:

Adam will use (http contains "hotmail") && (http contains "Reply-To") filter to display only the packets with hotmail email messages. Each Hotmail message contains the tag Reply-To: and "xxxx-xxx- xxx.xxxx.hotmail.com" in the received tag. Wireshark is a free packet sniffer computer application. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark is very similar to tcpdump, but it has a graphical front-end, and many more information sorting and filtering options. It allows the user to see all traffic being passed over the network (usually an Ethernet network but support is being added for others) by putting the network interface into promiscuous mode. Wireshark uses pcap to capture packets, so it can only capture the packets on the networks supported by pcap. It has the following features: Data can be captured "from the wire" from a live network connection or read from a file that records the already-captured packets. Live data can be read from a number of types of network, including Ethernet, IEEE 802.11, PPP, and loopback. Captured network data can be browsed via a GUI, or via the terminal (command line) version of the utility, tshark. Captured files can be programmatically edited or converted via command-line switches to the "editcap" program. Data display can be refined using a display filter. Plugins can be created for dissecting new protocols.

Answer options B, A, and D are incorrect. These are invalid tags.

asked 18/09/2024
Michael Golo
25 questions

Question 28

Report Export Collapse

Which of the following are the distance-vector routing protocols? Each correct answer represents a complete solution. Choose all that apply.

IS-IS
IS-IS
OSPF
OSPF
IGRP
IGRP
RIP
RIP
Suggested answer: C, D
Explanation:

Following are the two distance-vector routing protocols:

RIP: RIP is a dynamic routing protocol used in local and wide area networks. As such, it is classified as an interior gateway protocol (IGP). It uses the distancevector routing algorithm. It employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. It implements the split horizon, route poisoning, and hold-down mechanisms to prevent incorrect routing information from being propagated.

IGRP: Interior Gateway Routing Protocol (IGRP) is a Cisco proprietary distance vector Interior Gateway Protocol (IGP). It is used by Cisco routers to exchange routing data within an autonomous system (AS). This is a classful routing protocol and does not support variable length subnet masks (VLSM). IGRP supports multiple metrics for each route, including bandwidth, delay, load, MTU, and reliability. Answer options B and A are incorrect. OSPF and IS-IS are link state routing protocols.

asked 18/09/2024
GIORGOS KELAIDIS
36 questions

Question 29

Report Export Collapse

With which of the following forms of acknowledgment can the sender be informed by the data receiver about all segments that have arrived successfully?

Block Acknowledgment
Block Acknowledgment
Negative Acknowledgment
Negative Acknowledgment
Cumulative Acknowledgment
Cumulative Acknowledgment
Selective Acknowledgment
Selective Acknowledgment
Suggested answer: D
Explanation:

Selective Acknowledgment (SACK) is one of the forms of acknowledgment. With selective acknowledgments, the sender can be informed by a data receiver about all segments that have arrived successfully, so the sender retransmits only those segments that have actually been lost. The selective acknowledgment extension uses two TCP options: The first is an enabling option, "SACK-permitted", which may be sent in a SYN segment to indicate that the SACK option can be used once the connection is established. The other is the SACK option itself, which can be sent over an established connection once permission has been given by "SACK-permitted".

Answer option A is incorrect. Block Acknowledgment (BA) was initially defined in IEEE 802.11e as an optional scheme to improve the MAC efficiency. IEEE 802.11n capable devices are also referred to as High Throughput (HT) devices.

Instead of transmitting an individual ACK for every MPDU, multiple MPDUs can be acknowledged together using a single BA frame. Block Ack (BA) contains bitmap size of 64*16 bits. Each bit of this bitmap represents the status (success/ failure) of an MPDU.

Answer option B is incorrect. With Negative Acknowledgment, the receiver explicitly notifies the sender which packets, messages, or segments were received incorrectly that may need to be retransmitted.

Answer option C is incorrect. With Cumulative Acknowledgment, the receiver acknowledges that it has correctly received a packet, message, or segment in a stream which implicitly informs the sender that the previous packets were received correctly. TCP uses cumulative acknowledgment with its TCP sliding window.

asked 18/09/2024
Tyler Evans
49 questions

Question 30

Report Export Collapse

FILL BLANK

Fill in the blank with the appropriate term. ______________is a method for monitoring the e-mail delivery to the intended recipient.

Email tracking
Email tracking
Suggested answer: A
Explanation:

Email tracking is a method for monitoring the e-mail delivery to the intended recipient. Most tracking technologies utilize some form of digitally time-stamped record to reveal the exact time and date at which e-mail was received or opened, as well the IP address of the recipient. When a user uses such tools to send an e-mail, forward an e-mail, reply to an e-mail, or modify an e-mail, the resulting actions and tracks of the original e-mail are logged. The sender is notified of all actions performed on the tracked e-mail by an automatically generated e-mail. eMailTracker Pro and MailTracking.com are the tools that can be used to perform email tracking.

asked 18/09/2024
Marcin Golec
38 questions
Total 613 questions
Go to page: of 62
Search

Related questions