ExamGecko
Home Home / ECCouncil / 312-38

ECCouncil 312-38 Practice Test - Questions Answers, Page 47

Question list
Search
Search

List of questions

Search

Related questions











Which field is not included in the TCP header?

A.
Acknowledgment number
A.
Acknowledgment number
Answers
B.
Sequence number
B.
Sequence number
Answers
C.
Source port
C.
Source port
Answers
D.
Source IP address
D.
Source IP address
Answers
Suggested answer: D

John wants to implement a packet filtering firewall in his organization's network. What TCP/IP layer does a packet filtering firewall work on?

A.
Network Interface layer
A.
Network Interface layer
Answers
B.
Application layer
B.
Application layer
Answers
C.
IP layer
C.
IP layer
Answers
D.
TCP layer
D.
TCP layer
Answers
Suggested answer: C

What command is used to terminate certain processes in an Ubuntu system?

A.
# netstat Kill [ Target Process]
A.
# netstat Kill [ Target Process]
Answers
B.
#ps ax Kill
B.
#ps ax Kill
Answers
C.
#grep Kill [Target Process]
C.
#grep Kill [Target Process]
Answers
D.
#kill -9 [PID]
D.
#kill -9 [PID]
Answers
Suggested answer: D

Which type of wireless network threats an attacker stakes out the area from a nearby location with a high gain amplifier drowning out the legitimate access point?

A.
Rogue access point attack
A.
Rogue access point attack
Answers
B.
Jamming signal attack
B.
Jamming signal attack
Answers
C.
Ad Hoc Connection attack
C.
Ad Hoc Connection attack
Answers
D.
Unauthorized association
D.
Unauthorized association
Answers
Suggested answer: B

Which of the following type of UPS is used to supply power above 10kVA and provides an ideal electric output presentation, and its constant wear on the power components reduces the dependability?

A.
Line Interactive
A.
Line Interactive
Answers
B.
Double conversion on-line
B.
Double conversion on-line
Answers
C.
Stand by Ferro
C.
Stand by Ferro
Answers
D.
Stand by On-line hybrid
D.
Stand by On-line hybrid
Answers
Suggested answer: B

John has planned to update all Linux workstations in his network. The organization is using various Linux distributions including Red hat, Fedora and Debian.

Which of following commands will he use to update each respective Linux distribution?

A.
1-ii, 2-i,3-iv,4-iii
A.
1-ii, 2-i,3-iv,4-iii
Answers
B.
1-v,2-iii,3-i,4-iv
B.
1-v,2-iii,3-i,4-iv
Answers
C.
1-iv,2-v,3-iv,4-iii
C.
1-iv,2-v,3-iv,4-iii
Answers
D.
1-iii,2-iv,3-ii,4-v
D.
1-iii,2-iv,3-ii,4-v
Answers
Suggested answer: A

Andrew would like to configure IPsec in a manner that provides confidentiality for the content of packets. What component of IPsec provides this capability?

A.
IKE
A.
IKE
Answers
B.
ESP
B.
ESP
Answers
C.
AH
C.
AH
Answers
D.
ISAKMP
D.
ISAKMP
Answers
Suggested answer: B

A newly joined network administrator wants to assess the organization against possible risk. He notices the organization doesn't have a __________ identified which helps measure how risky an activity is.

A.
Risk Severity
A.
Risk Severity
Answers
B.
Risk Matrix
B.
Risk Matrix
Answers
C.
Risk levels
C.
Risk levels
Answers
D.
Key Risk Indicator
D.
Key Risk Indicator
Answers
Suggested answer: B

Sean has built a site-to-site VPN architecture between the head office and the branch office of his company. When users in the branch office and head office try to communicate with each other, the traffic is encapsulated. As the traffic passes though the gateway, it is encapsulated again. The header and payload both are encapsulated. This second encapsulation occurs only in the __________ implementation of a VPN.

A.
Point-to-Point Mode
A.
Point-to-Point Mode
Answers
B.
Transport Mode
B.
Transport Mode
Answers
C.
Tunnel Mode
C.
Tunnel Mode
Answers
D.
Full Mesh Mode
D.
Full Mesh Mode
Answers
Suggested answer: C

Simon had all his systems administrators implement hardware and software firewalls to ensure network security. They implemented IDS/IPS systems throughout the network to check for and stop any unauthorized traffic that may attempt to enter. Although Simon and his administrators believed they were secure, a hacker group was able to get into the network and modify files hosted on the company's website. After searching through the firewall and server logs, no one could find how the attackers were able to get in. He decides that the entire network needs to be monitored for critical and essential file changes. This monitoring tool alerts administrators when a critical file is altered. What tool could Simon and his administrators implement to accomplish this?

A.
They need to use Nessus.
A.
They need to use Nessus.
Answers
B.
Snort is the best tool for their situation.
B.
Snort is the best tool for their situation.
Answers
C.
They could use Tripwire.
C.
They could use Tripwire.
Answers
D.
They can implement Wireshark.
D.
They can implement Wireshark.
Answers
Suggested answer: C
Total 613 questions
Go to page: of 62