ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 35

Question list
Search
Search

List of questions

Search

Related questions











Which of the following key features used by TCP to regulate the amount of data sent to the host machine to another network?

A.
congestion control
A.
congestion control
Answers
B.
flow control
B.
flow control
Answers
C.
None
C.
None
Answers
D.
TCP timestamp
D.
TCP timestamp
Answers
E.
SEQ ID NO:
E.
SEQ ID NO:
Answers
Suggested answer: B

Which of the following is the standard protocol that provides VPN security at the highest level?

A.
P.M
A.
P.M
Answers
B.
IPSec
B.
IPSec
Answers
C.
PPP
C.
PPP
Answers
D.
None
D.
None
Answers
E.
L2TP
E.
L2TP
Answers
Suggested answer: B

Which of the following is a distance vector routing protocols? Each correct answer represents a complete solution. Choose all that apply.

A.
OSPF
A.
OSPF
Answers
B.
IGRP
B.
IGRP
Answers
C.
IS-IS
C.
IS-IS
Answers
D.
REST IN PEACE
D.
REST IN PEACE
Answers
Suggested answer: B, D

Which of the following IP addresses is not reserved for the hosts? Each correct answer represents a complete solution. Choose all that apply.

A.
E-Class
A.
E-Class
Answers
B.
class D
B.
class D
Answers
C.
class A
C.
class A
Answers
D.
BCorrect
D.
BCorrect
Answers
Suggested answer: A, B

What is the technique used in the cost estimates for the project during the design phase of the following? Each correct answer represents a complete solution.

Choose all that apply.

A.
expert assessment
A.
expert assessment
Answers
B.
The Delphi technique
B.
The Delphi technique
Answers
C.
Function point analysis
C.
Function point analysis
Answers
D.
Program Evaluation Technique (PERT)
D.
Program Evaluation Technique (PERT)
Answers
Suggested answer: A, B, C

Which of the following is a management process that provides a framework to stimulate a rapid recovery, and the ability to react effectively to protect the interests of its brand, reputation and stakeholders?

A.
None
A.
None
Answers
B.
log analysis
B.
log analysis
Answers
C.
Business Continuity Management
C.
Business Continuity Management
Answers
D.
patch management
D.
patch management
Answers
E.
response systems
E.
response systems
Answers
Suggested answer: C

You just set up a wireless network to customers in the cafe. Which of the following are good security measures implemented? Each correct answer represents a complete solution. Choose all that apply.

A.
WEP encryption
A.
WEP encryption
Answers
B.
WPA encryption
B.
WPA encryption
Answers
C.
Not broadcasting the SSID
C.
Not broadcasting the SSID
Answers
D.
The MAC-filtering router
D.
The MAC-filtering router
Answers
Suggested answer: A, B

What is needed for idle scan a closed port the next steps? Each correct answer represents a part of the solution. Choose all that apply.

A.
Zombie ignores unsolicited RST, and IP ID remains unchanged.
A.
Zombie ignores unsolicited RST, and IP ID remains unchanged.
Answers
B.
The attacker sends a SYN/ACK zombie.
B.
The attacker sends a SYN/ACK zombie.
Answers
C.
In response to the SYN, the target to send RST.
C.
In response to the SYN, the target to send RST.
Answers
D.
Zombie IP ID will increase by only 1.
D.
Zombie IP ID will increase by only 1.
Answers
E.
Zombie IP ID 2 rises.
E.
Zombie IP ID 2 rises.
Answers
Suggested answer: A, B, C, D

Which of the following is a mechanism that helps to ensure that only the intended and authorized recipients are able to read the data?

A.
access to information
A.
access to information
Answers
B.
none
B.
none
Answers
C.
integrity
C.
integrity
Answers
D.
authentication
D.
authentication
Answers
E.
confidence
E.
confidence
Answers
Suggested answer: E

Which of the following attacks, the attacker cannot use the software, which is trying a number of key combinations in order to obtain your password?

A.
Buffer overflow
A.
Buffer overflow
Answers
B.
Zero-day attack
B.
Zero-day attack
Answers
C.
Smurf attack
C.
Smurf attack
Answers
D.
None
D.
None
Answers
E.
Shock brutal force
E.
Shock brutal force
Answers
Suggested answer: E
Total 613 questions
Go to page: of 62