ExamGecko
Home / ECCouncil / 312-38 / List of questions
Ask Question

ECCouncil 312-38 Practice Test - Questions Answers, Page 69

Add to Whishlist

List of questions

Question 681

Report Export Collapse

Arman transferred some money to his friend's account using a net banking service. After a few hours, his friend informed him that he hadn't received the money yet. Arman logged on to the bank's website to investigate and discovered that the amount had been transferred to an unknown account instead. The bank, upon receiving Arman's complaint, discovered that someone had established a station between Arman's and the bank server's communication system. The station intercepted the communication and inserted another account number replacing his friend's account number. What is such an attack called?

Become a Premium Member for full access
  Unlock Premium Member

Question 682

Report Export Collapse

Xenon is a leading real estate firm located in Australia. Recently, the company had decided a bid amount for a prestigious construction project and was sure of being awarded the project. Unfortunately, the company lost the tender to one of its competitors. A few days later, while performing a network scan, the network admin identified that somebody had captured the confidential e-mails conversions related to the tender. Upon further investigation, the admin discovered that one of the switch ports was left open and an employee had plugged into the network using an Ethernet cable.

Which attack did the employee perform in the above situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 683

Report Export Collapse

Bankofamerica Enterprise is working on an internet and usage policy in a way to control the internet demand. What group of policy does this belong to?

Become a Premium Member for full access
  Unlock Premium Member

Question 684

Report Export Collapse

What cryptography technique can encrypt small amounts of data and applies it to digital signatures?

Become a Premium Member for full access
  Unlock Premium Member

Question 685

Report Export Collapse

Clement is the CEO of an IT firm. He wants to implement a policy allowing employees with a preapproved set of devices from which the employees choose devices (laptops, smartphones, and tablets) to access company data as per the organization's access privileges. Which among the following policies does Clement want to enforce?

Become a Premium Member for full access
  Unlock Premium Member

Question 686

Report Export Collapse

Which of the following indicators are discovered through an attacker's intent, their end goal or purpose, and a series of actions that they must take before being able to successfully launch an attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 687

Report Export Collapse

Which component of the data packets is encrypted in Transport mode encryption of an IPsec server?

Become a Premium Member for full access
  Unlock Premium Member

Question 688

Report Export Collapse

Which of the following network security protocols protects from sniffing attacks by encrypting entire communication between the clients and server including user passwords?

Become a Premium Member for full access
  Unlock Premium Member

Question 689

Report Export Collapse

Which of the following Wireshark filters allows an administrator to detect SYN/FIN DDoS attempt on the network?

Become a Premium Member for full access
  Unlock Premium Member

Question 690

Report Export Collapse

Identify the attack signature analysis technique carried out when attack signatures are contained in packet headers.

Become a Premium Member for full access
  Unlock Premium Member
Total 696 questions
Go to page: of 70
Search

Related questions