ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

Related questions











Which of the following policies to help define what users can and should do to use the network and organization of computer equipment?

A.
None
A.
None
Answers
B.
IT policy
B.
IT policy
Answers
C.
user policy
C.
user policy
Answers
D.
general policy
D.
general policy
Answers
E.
remote access policy
E.
remote access policy
Answers
Suggested answer: C

Which of the following is a class of attacks to break through, which depends on a greater probability of collisions between random attack was detected, and try to fixed rate permutations?

A.
Dictionary attack
A.
Dictionary attack
Answers
B.
None
B.
None
Answers
C.
birthday attack
C.
birthday attack
Answers
D.
phishing attack
D.
phishing attack
Answers
E.
replay attack
E.
replay attack
Answers
Suggested answer: C

Which of the following offer "always-on" Internet service for connecting to your ISP? Each correct answer represents a complete solution. Choose all that apply.

A.
analog modem
A.
analog modem
Answers
B.
digital modem
B.
digital modem
Answers
C.
DSL
C.
DSL
Answers
D.
cable modem
D.
cable modem
Answers
Suggested answer: C, D

The attacks are classified as which of the following? Each correct answer represents a complete solution. Choose all that apply.

A.
replay attack
A.
replay attack
Answers
B.
active attack
B.
active attack
Answers
C.
session hijacking
C.
session hijacking
Answers
D.
passive attack
D.
passive attack
Answers
Suggested answer: B, D

Which of the following routing metrics refers to the time required to transfer the package to the source via the Internet?

A.
None
A.
None
Answers
B.
routing delay
B.
routing delay
Answers
C.
length of the trail
C.
length of the trail
Answers
D.
charge
D.
charge
Answers
E.
bandwidth
E.
bandwidth
Answers
Suggested answer: B

Which of the following is a kind of security, which deals with the protection of false signals transmitted by the electrical system?

A.
None
A.
None
Answers
B.
emanation Safety
B.
emanation Safety
Answers
C.
hardware security
C.
hardware security
Answers
D.
physical security
D.
physical security
Answers
E.
communications Security
E.
communications Security
Answers
Suggested answer: B

John works Incident Director of Tech World Inc. His job is to set up a wireless network in his organization. For this purpose, he needs to decide on appropriate equipment and policies need to set up a network. Which of the following stages of the incident handling process to help him accomplish the task?

A.
Preparation
A.
Preparation
Answers
B.
None
B.
None
Answers
C.
Recovery
C.
Recovery
Answers
D.
the eradication of
D.
the eradication of
Answers
E.
containment
E.
containment
Answers
Suggested answer: A

You are using more than the safety of the existing network. You'll find a machine that is not in use as such, but is a software that emulates the operation of a sensitive database server. What is this?

A.
The reactive IDS
A.
The reactive IDS
Answers
B.
Honey Pot
B.
Honey Pot
Answers
C.
None
C.
None
Answers
D.
Virus
D.
Virus
Answers
E.
The polymorphic virus
E.
The polymorphic virus
Answers
Suggested answer: B

Which of the following router configuration modes to change the terminal settings temporarily, perform basic tests, and lists the system information?

A.
None
A.
None
Answers
B.
UI Config
B.
UI Config
Answers
C.
user EXEC
C.
user EXEC
Answers
D.
Global Config
D.
Global Config
Answers
E.
the privileged EXEC
E.
the privileged EXEC
Answers
Suggested answer: C

Which of the following is a worldwide organization whose mission is to create, refine and promote internet safety standards?

A.
None
A.
None
Answers
B.
SPROUT
B.
SPROUT
Answers
C.
ANSI
C.
ANSI
Answers
D.
IEEE
D.
IEEE
Answers
E.
WASC
E.
WASC
Answers
Suggested answer: E
Total 613 questions
Go to page: of 62