ECCouncil 312-38 Practice Test - Questions Answers, Page 68

List of questions
Question 671

Identify the Password Attack Technique in which the adversary attacks cryptographic hash functions based on the probability, that if a hashing process is used for creating a key, then the same is used for other keys?
Question 672

Riya bought some clothes and a watch from an online shopping site a few days back. Since then, whenever she accesses any other application (games, browser, etc.) on her mobile, she is spammed with advertisements for clothes and watches similar to the ones she bought. What can be the underlying reason for Riya's situation?
Question 673

Which among the following control and manage the communication between VNF with computing, storage, and network resources along with virtualization?
Question 674

Martin is a professional hacker. He is performing reconnaissance on an organization to hack a few target systems. As a part of this method, he needs to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls, etc. To obtain such information, Martin decided to use automated tools.
Which of the following tool must be employed by Martin?
Question 675

_______________ is a structured and continuous process which integrates information security and risk management activities into the system development life cycle (SDLC).
Question 676

Which of the following Layers of IoT Architecture provides dashboards to monitor, analyze, and implement proactive decisions?
Question 677

Which of the following connects the SDN application layer and SDN controller and allows communication between the network services and business applications?
Question 678

A CCTV camera, which can be accessed on the smartphone from a remote location, is an example of _____
Question 679

How is the chip-level security of an IoT device achieved?
Question 680

A popular e-commerce company has recently received a lot of complaints from its customers. Most of the complaints are about the customers being redirected to some other website when trying to access the e-com site, leading to all their systems being compromised and corrupted. Upon investigation, the network admin of the firm discovered that some adversary had manipulated the company's IP address in the domain name server's cache. What is such an attack called?
Question