ECCouncil 312-38 Practice Test - Questions Answers, Page 33

List of questions
Question 321

Which of the following is an attack on a website that changes the appearance of the site and seriously damage the website trust and reputation?
Question 322

Which of the following is virtually unsolicited e-mail messages, often with commercial content, in large quantities of indiscriminate set of recipients? Each correct answer represents a complete solution.
Question 323

Which of the following tools is a free portable tracker that helps the user to trace the laptop if it is stolen?
Question 324

Peter, a malicious hacker obtains e-mail addresses by collecting them messages, blogs, DNS lists and Web pages. Then he will send a large number of unsolicited commercial e-mail (UCE) messages to these addresses. What Peter at the following e-mail committing crimes?
Question 325

Which of the following tools is an open source network intrusion prevention and detection system that works network sniffer and record the operation of the network, which is coordinated pre-signatures?
Question 326

Which of the following statements best describes the consequences of a disaster recovery test?
Question 327

Which of the following flag to set whether the scan sends TCP Christmas tree frame with the remote machine? Each correct answer represents a part of the solution. Choose all that apply.
Question 328

What is used for drawing symbols in public places following techniques of advertising an open Wi-Fi network?
Question 329

Which of the following firewalls are used to monitor the status of active connections, and configure the network packets to pass through the firewall? Each correct answer represents a complete solution. Choose all that apply.
Question 330

Which of the following conditions cannot enter the system ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
Question