ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 37

Add to Whishlist

List of questions

Question 361

Report Export Collapse

Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 362

Report Export Collapse

Which of the following types of coaxial cable used for cable television and cable modems?

Become a Premium Member for full access
  Unlock Premium Member

Question 363

Report Export Collapse

Which of the following are valid steps to secure routers? Each correct answer represents a complete solution. Choose all that apply.

Become a Premium Member for full access
  Unlock Premium Member

Question 364

Report Export Collapse

Each of the following is a network layer protocol used for a particular (MAC) address to obtain an IP address?

Become a Premium Member for full access
  Unlock Premium Member

Question 365

Report Export Collapse

Adam, malicious hacker, has just succeeded in stealing through a secure cookie XSS attack. He is able to play back the cookie even if the session is valid on the server. Which of the following is the most likely cause of this issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 366

Report Export Collapse

Which of the following is a compatible network device that converts various communication protocols and are used to connect different network technologies?

Become a Premium Member for full access
  Unlock Premium Member

Question 367

Report Export Collapse

Which of the following is a computer network protocol used by the hosts to apply for the tasks the IP address and other configuration information?

Become a Premium Member for full access
  Unlock Premium Member

Question 368

Report Export Collapse

You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?

Become a Premium Member for full access
  Unlock Premium Member

Question 369

Report Export Collapse

Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?

Become a Premium Member for full access
  Unlock Premium Member

Question 370

Report Export Collapse

An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions