ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is an attack on a website that changes the appearance of the site and seriously damage the website trust and reputation?

A.
None
A.
None
Answers
B.
website defacement
B.
website defacement
Answers
C.
spoofing
C.
spoofing
Answers
D.
Buffer overflow
D.
Buffer overflow
Answers
E.
Zero-day attack
E.
Zero-day attack
Answers
Suggested answer: B

Which of the following is virtually unsolicited e-mail messages, often with commercial content, in large quantities of indiscriminate set of recipients? Each correct answer represents a complete solution.

A.
E-mail scam
A.
E-mail scam
Answers
B.
spam
B.
spam
Answers
C.
E-mail harassment
C.
E-mail harassment
Answers
Suggested answer: B

Which of the following tools is a free portable tracker that helps the user to trace the laptop if it is stolen?

A.
Nessus
A.
Nessus
Answers
B.
bridle
B.
bridle
Answers
C.
SAINT
C.
SAINT
Answers
D.
Adeona
D.
Adeona
Answers
E.
None
E.
None
Answers
Suggested answer: D

Peter, a malicious hacker obtains e-mail addresses by collecting them messages, blogs, DNS lists and Web pages. Then he will send a large number of unsolicited commercial e-mail (UCE) messages to these addresses. What Peter at the following e-mail committing crimes?

A.
E-Mail storm
A.
E-Mail storm
Answers
B.
E-Mail bombing
B.
E-Mail bombing
Answers
C.
spam
C.
spam
Answers
D.
E-Mail scam
D.
E-Mail scam
Answers
E.
None
E.
None
Answers
Suggested answer: C

Which of the following tools is an open source network intrusion prevention and detection system that works network sniffer and record the operation of the network, which is coordinated pre-signatures?

A.
dsniff
A.
dsniff
Answers
B.
kismet
B.
kismet
Answers
C.
None
C.
None
Answers
D.
KisMAC
D.
KisMAC
Answers
E.
bridle
E.
bridle
Answers
Suggested answer: E

Which of the following statements best describes the consequences of a disaster recovery test?

A.
None
A.
None
Answers
B.
The test results should be kept secret.
B.
The test results should be kept secret.
Answers
C.
If no deficiencies were found during the test, so the plan is probably perfect.
C.
If no deficiencies were found during the test, so the plan is probably perfect.
Answers
D.
If no deficiencies were found during the test, the test was probably erroneous.
D.
If no deficiencies were found during the test, the test was probably erroneous.
Answers
E.
The plan should not change any of the test results would be.
E.
The plan should not change any of the test results would be.
Answers
Suggested answer: D

Which of the following flag to set whether the scan sends TCP Christmas tree frame with the remote machine? Each correct answer represents a part of the solution. Choose all that apply.

A.
FIN
A.
FIN
Answers
B.
URG
B.
URG
Answers
C.
RST
C.
RST
Answers
D.
PUSH
D.
PUSH
Answers
Suggested answer: A, B, D

What is used for drawing symbols in public places following techniques of advertising an open Wi-Fi network?

A.
wardriving
A.
wardriving
Answers
B.
None
B.
None
Answers
C.
spam
C.
spam
Answers
D.
war call
D.
war call
Answers
E.
warchalking
E.
warchalking
Answers
Suggested answer: E

Which of the following firewalls are used to monitor the status of active connections, and configure the network packets to pass through the firewall? Each correct answer represents a complete solution. Choose all that apply.

A.
Farm owner
A.
Farm owner
Answers
B.
Proxy server
B.
Proxy server
Answers
C.
Dynamic packet filtering
C.
Dynamic packet filtering
Answers
D.
The circuit gateway
D.
The circuit gateway
Answers
Suggested answer: A, C

Which of the following conditions cannot enter the system ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.

A.
The router does not find a valid operating system image.
A.
The router does not find a valid operating system image.
Answers
B.
The router does not have the configuration file.
B.
The router does not have the configuration file.
Answers
C.
The user interrupts the boot sequence.
C.
The user interrupts the boot sequence.
Answers
D.
It is necessary to set the operating parameters.
D.
It is necessary to set the operating parameters.
Answers
Suggested answer: A, C
Total 613 questions
Go to page: of 62