ECCouncil 312-38 Practice Test - Questions Answers, Page 37
List of questions
Related questions
Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of coaxial cable used for cable television and cable modems?
Which of the following are valid steps to secure routers? Each correct answer represents a complete solution. Choose all that apply.
Each of the following is a network layer protocol used for a particular (MAC) address to obtain an IP address?
Adam, malicious hacker, has just succeeded in stealing through a secure cookie XSS attack. He is able to play back the cookie even if the session is valid on the server. Which of the following is the most likely cause of this issue?
Which of the following is a compatible network device that converts various communication protocols and are used to connect different network technologies?
Which of the following is a computer network protocol used by the hosts to apply for the tasks the IP address and other configuration information?
You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?
Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?
An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?
Question