Which of the following tools are NOT used for logging network activities in the Linux operating system? Each correct answer represents a complete solution. Choose all that apply.
A. PsLoggedOn
B. PsGetSid
C. Timbersee
D. Swatch
Which of the following types of coaxial cable is used for cable TV and cable modems?
A. RG-8
B. RG-62
C. RG-59
D. RG-58
Which of the following is a software tool used in passive attacks for capturing network traffic?
A. Intrusion prevention system
B. Intrusion detection system
C. Warchalking
D. Sniffer
You work as a Network Security Analyzer. You got a suspicious email while working on a forensic project. Now, you want to know the IP address of the sender so that you can analyze various information such as the actual location, domain information, operating system being used, contact information, etc. of the email sender with the help of various tools and resources. You also want to check whether this email is fake or real. You know that analysis of email headers is a good starting point in such cases. The email header of the suspicious email is given below:
What is the IP address of the sender of this email?
A. 209.191.91.180
B. 141.1.1.1
C. 172.16.10.90
D. 216.168.54.25
In an Ethernet peer-to-peer network, which of the following cables is used to connect two computers, using RJ-45 connectors and Category-5 UTP cable?
A. Serial
B. Loopback
C. Crossover
D. Parallel
Which of the following statements are TRUE about Demilitarized zone (DMZ)? Each correct answer represents a complete solution. Choose all that apply.
A. In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the Internet.
B. Demilitarized zone is a physical or logical sub-network that contains and exposes external services of an organization to a larger un-trusted network.
C. The purpose of a DMZ is to add an additional layer of security to the Local Area Network of an organization.
D. Hosts in the DMZ have full connectivity to specific hosts in the internal network.
Which of the following is a worldwide organization that aims to establish, refine, and promote Internet security standards?
A. ANSI
B. WASC
C. IEEE
D. ITU
Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? Each correct answer represents a complete solution. Choose all that apply.
A. Email spoofing
B. Junk mail
C. E-mail spam
D. Email jamming
Which of the following network scanning tools is a TCP/UDP port scanner that works as a ping sweeper and hostname resolver?
A. Hping
B. SuperScan
C. Netstat
D. Nmap
The IP addresses reserved for experimental purposes belong to which of the following classes?
A. Class E
B. Class C
C. Class A
D. Class D
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.