ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











Which of the following statements are true about IPv6 network? Each correct answer represents a complete solution. Choose all that apply.

A.
It uses a longer subnet masks as those used for IPv4.
A.
It uses a longer subnet masks as those used for IPv4.
Answers
B.
The interoperability, the IPv4 addresses using the last 32 bits of the IPv6 address.
B.
The interoperability, the IPv4 addresses using the last 32 bits of the IPv6 address.
Answers
C.
It provides enhanced authentication and security.
C.
It provides enhanced authentication and security.
Answers
D.
It uses 128-bit addresses.
D.
It uses 128-bit addresses.
Answers
E.
It's more of available IP addresses.
E.
It's more of available IP addresses.
Answers
Suggested answer: B, C, D, E

Which of the following types of coaxial cable used for cable television and cable modems?

A.
RG-8
A.
RG-8
Answers
B.
RG-59
B.
RG-59
Answers
C.
RG-58
C.
RG-58
Answers
D.
None
D.
None
Answers
E.
RG-62
E.
RG-62
Answers
Suggested answer: B

Which of the following are valid steps to secure routers? Each correct answer represents a complete solution. Choose all that apply.

A.
Keep routers updated with the latest security updates.
A.
Keep routers updated with the latest security updates.
Answers
B.
Use a password that is easy to remember the router's administrative console.
B.
Use a password that is easy to remember the router's administrative console.
Answers
C.
Configure access list entries to prevent unauthorized connections and routing.
C.
Configure access list entries to prevent unauthorized connections and routing.
Answers
D.
Use a complex password of the router management console.
D.
Use a complex password of the router management console.
Answers
Suggested answer: A, C, D

Each of the following is a network layer protocol used for a particular (MAC) address to obtain an IP address?

A.
ARP
A.
ARP
Answers
B.
None
B.
None
Answers
C.
RARP
C.
RARP
Answers
D.
P.M
D.
P.M
Answers
E.
PIM
E.
PIM
Answers
Suggested answer: C

Adam, malicious hacker, has just succeeded in stealing through a secure cookie XSS attack. He is able to play back the cookie even if the session is valid on the server. Which of the following is the most likely cause of this issue?

A.
Two-way encryption is used.
A.
Two-way encryption is used.
Answers
B.
Encryption is performed at the application level (one encryption key).
B.
Encryption is performed at the application level (one encryption key).
Answers
C.
Encryption does not apply.
C.
Encryption does not apply.
Answers
D.
Scrambling is performed in the network (layer 1 encryption)
D.
Scrambling is performed in the network (layer 1 encryption)
Answers
E.
None
E.
None
Answers
Suggested answer: B

Which of the following is a compatible network device that converts various communication protocols and are used to connect different network technologies?

A.
port
A.
port
Answers
B.
change
B.
change
Answers
C.
none
C.
none
Answers
D.
bridge
D.
bridge
Answers
E.
router
E.
router
Answers
Suggested answer: A

Which of the following is a computer network protocol used by the hosts to apply for the tasks the IP address and other configuration information?

A.
DHCP
A.
DHCP
Answers
B.
ARP
B.
ARP
Answers
C.
Telnet
C.
Telnet
Answers
D.
None
D.
None
Answers
E.
SNMP
E.
SNMP
Answers
Suggested answer: A

You are an IT security consultant working on a contract for a large manufacturing company to audit their entire network. After performing all the tests and building your report, you present a number of recommendations to the company and what they should implement to become more secure. One recommendation is to install a network-based device that notifies IT employees whenever malicious or questionable traffic is found. From your talks with the company, you know that they do not want a device that actually drops traffic completely, they only want notification. What type of device are you suggesting?

A.
A NIDS device would work best for the company.
A.
A NIDS device would work best for the company.
Answers
B.
A HIPS device would best suite this company.
B.
A HIPS device would best suite this company.
Answers
C.
The best solution to cover the needs of this company would be a HIDS device.
C.
The best solution to cover the needs of this company would be a HIDS device.
Answers
D.
You are suggesting a NIPS device.
D.
You are suggesting a NIPS device.
Answers
Suggested answer: A

Cindy is the network security administrator for her company. She just got back from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. She is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established, she sends RST packets to those hosts to stop the session. She has done this to see how her intrusion detection system will log the traffic. What type of scan is Cindy attempting here?

A.
The type of scan she is using is called a NULL scan.
A.
The type of scan she is using is called a NULL scan.
Answers
B.
Cindy is attempting to find live hosts on her company's network by using a XMAS scan.
B.
Cindy is attempting to find live hosts on her company's network by using a XMAS scan.
Answers
C.
Cindy is using a half-open scan to find live hosts on her network.
C.
Cindy is using a half-open scan to find live hosts on her network.
Answers
D.
She is utilizing a RST scan to find live hosts that are listening on her network.
D.
She is utilizing a RST scan to find live hosts that are listening on her network.
Answers
Suggested answer: C

An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?

A.
Hybrid
A.
Hybrid
Answers
B.
Rainbow table
B.
Rainbow table
Answers
C.
Dictionary
C.
Dictionary
Answers
D.
Bruteforce
D.
Bruteforce
Answers
Suggested answer: C
Total 613 questions
Go to page: of 62