312-38 EC-CouncilNetwork SecurityAdministrator Practice Test Set 2

Which of the following OSI layers defines the electrical and physical specifications for devices?


Options are :

  • Presentation layer
  • Transport layer
  • Physical layer (Correct)
  • Data link layer

Answer : Physical layer

ECCouncil EC0-479 Certified Security Analyst (ECSA) Exam Set 1

Which of the following layers is closest to the end user?


Options are :

  • Presentation layer
  • Session layer
  • Application layer (Correct)
  • Physical layer

Answer : Application layer

In which of the following transmission modes is communication bi-directional?


Options are :

  • Half-duplex mode
  • Root mode
  • Simplex mode
  • Full-duplex mode (Correct)

Answer : Full-duplex mode

Which of the following protocols is described as a connection-oriented and reliable delivery transport layer protocol?


Options are :

  • TCP (Correct)
  • IP
  • SSL
  • UDP

Answer : TCP

ECCouncil ECSS Certified Security Specialist Practice Exam Set 7

Which of the following IEEE standards is also called Fast Basic Service Set Transition?


Options are :

  • 802.11b
  • 802.11a
  • 802.11e
  • 802.11r (Correct)

Answer : 802.11r

What is the range for private ports?


Options are :

  • Above 65535
  • 49152 through 65535 (Correct)
  • 1024 through 49151
  • 0 through 1023

Answer : 49152 through 65535

Which of the following standards defines Logical Link Control (LLC)?


Options are :

  • 802.3
  • 802.2 (Correct)
  • 802.4
  • 802.5

Answer : 802.2

712-50 EC-Council Certified CISO Certification Practice Exam Set 3

The IP addresses reserved for experimental purposes belong to which of the following classes?


Options are :

  • Class E (Correct)
  • Class A
  • Class C
  • Class D

Answer : Class E

Which of the following is a network point that acts as an entrance to another network?


Options are :

  • Receiver
  • Gateway (Correct)
  • Hub
  • Bridge

Answer : Gateway

Which of the following layers provides communication session management between host computers?


Options are :

  • Link layer
  • Application layer
  • Internet layer
  • Transport layer (Correct)

Answer : Transport layer

312-50V8 Certified Ethical Hacker V8 Certification Exam Set 4

Which of the following IEEE standards defines the demand priority access method?


Options are :

  • 802.12 (Correct)
  • 802.15
  • 802.11
  • 802.3

Answer : 802.12

Which of the following flags is set when a closed port responds to an Xmas tree scan?


Options are :

  • PUSH
  • ACK
  • RST (Correct)
  • FIN

Answer : RST

Which of the following layers of the OSI model provides physical addressing?


Options are :

  • Physical layer
  • Data link layer (Correct)
  • Network
  • Application layer

Answer : Data link layer

ECCouncil 312-38 Network Security Administrator (ENSA) Exam Set 4

Which of the following IP addresses is the loopback address in IPv6?


Options are :

  • 0:0:0:0:0:0:0:1 (Correct)
  • 0:0:0:1:1:0:0:0
  • 0:0:0:0:0:0:0:0
  • 1:0:0:0:0:0:0:0

Answer : 0:0:0:0:0:0:0:1

Which of the following IEEE standards defines the token passing ring topology?


Options are :

  • 802.4
  • 802.5 (Correct)
  • 802.3
  • 802.7

Answer : 802.5

Which of the following layers of the OSI model provides interhost communication?


Options are :

  • Application layer
  • Session layer (Correct)
  • Transport layer
  • Network layer

Answer : Session layer

ECCouncil 312-76Disaster Recover Professional Practice Exam Set 5

Which of the following is a presentation layer protocol?


Options are :

  • BGP
  • TCP
  • LWAPP (Correct)
  • RPC

Answer : LWAPP

Which of the following is a high-speed network that connects computers, printers, and other network devices together?


Options are :

  • MAN
  • LAN (Correct)
  • WAN
  • CAN

Answer : LAN

Which of the following protocols sends a jam signal when a collision is detected?


Options are :

  • CSMA/CD (Correct)
  • ALOHA
  • CSMA
  • CSMA/CA

Answer : CSMA/CD

ECCouncil EC0-479 Certified Security Analyst (ECSA) Exam Set 7

Which of the following standards is approved by IEEE-SA for wireless personal area networks?


Options are :

  • 802.16
  • 802.15 (Correct)
  • 802.1
  • 802.11a

Answer : 802.15

Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?


Options are :

  • Analysis of Vulnerabilities (Correct)
  • Assessment of Risk
  • Analysis of Threats
  • Identification of Critical Information
  • Application of Appropriate OPSEC Measures

Answer : Analysis of Vulnerabilities

ECCouncil 412-79v8 Certified Security Analyst (ECSA) Exam Set 5

Which of the following are the six different phases of the Incident handling process? Each correct answer represents a complete solution. Choose all that apply.

A. Containment

B. Identification

C. Post mortem review

D. Preparation

E. Lessons learned

F. Recovery

G. Eradication


Options are :

  • C,D,F,E,G,A
  • F,A,C,E,B,G
  • D,G,B,A,E
  • F,C,B,D,E,A
  • A,B,D,E,F,G (Correct)
  • D,G,B,C,E,A
  • D,C,A,B,E,F

Answer : A,B,D,E,F,G

Attacks are classified into which of the following? Each correct answer represents a complete solution. Choose all that apply.

A. Active attack

B. Session hijacking

C. Passive attack

D. Replay attack


Options are :

  • B,C
  • D,B
  • A,C (Correct)
  • C,A

Answer : A,C

Which of the following are the various methods that a device can use for logging information on a Cisco router? Each correct answer represents a complete solution. Choose all that apply.

A. Buffered logging

B. Syslog logging

C. NTP logging

D. Terminal logging

E. Console logging

F. SNMP logging


Options are :

  • D,F,E,A,C,
  • F,E,D,C,A
  • D,C,B,A,E
  • F,E,A,D,C
  • A,B,D,E,F (Correct)
  • B,C,A,E,D

Answer : A,B,D,E,F

ECCouncil ECSS Certified Security Specialist Practice Exam Set 7

Which of the following is the primary international body for fostering cooperative standards for telecommunications equipment and systems?


Options are :

  • CCITT (Correct)
  • ICANN
  • NIST
  • IEEE

Answer : CCITT

Which of the following is a type of computer security that deals with protection against spurious signals emitted by electrical equipment in the system?


Options are :

  • Communication Security
  • Emanation Security (Correct)
  • Hardware security
  • Physical security

Answer : Emanation Security

Which of the following is a standard-based protocol that provides the highest level of VPN security?


Options are :

  • IPSec (Correct)
  • L2TP
  • IP
  • PPP

Answer : IPSec

ECCouncil 312-50 Certified Ethical Hacker Practical Exam Set 1

Which of the following is a technique for gathering information about a remote network protected by a firewall?


Options are :

  • War chalking
  • War driving
  • Fire walking (Correct)
  • War dialing

Answer : Fire walking

Which of the following is an exterior gateway protocol that communicates using a Transmission Control Protocol (TCP) and sends the updated router table information?


Options are :

  • IGMP
  • IRDP
  • BGP (Correct)
  • OSPF

Answer : BGP

Which of the following is a Unix and Windows tool capable of intercepting traffic on a network segment and capturing username and password?


Options are :

  • Ettercap (Correct)
  • AirSnort
  • Back Track
  • Aircrack

Answer : Ettercap

ECCouncil 312-76Disaster Recover Professional Practice Exam Set 7

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions