Network security is the specialist area, which consists of the provisions and policies adopted by the Network Administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. For which of the following reasons is network security needed? Each correct answer represents a complete solution. Choose all that apply.
A. To protect information from loss and deliver it to its destination properly
B. To protect information from unwanted editing, accidentally or intentionally by unauthorized users
C. To protect private information on the Internet
D. To prevent a user from sending a message to another user with the name of a third person
With which of the following flag sets does the Xmas tree scan send a TCP frame to a remote device? Each correct answer represents a part of the solution. Choose all that apply.
A. PUSH
B. RST
C. FIN
D. URG
Which of the following is a non-profit organization that oversees the allocation of IP addresses, management of the DNS infrastructure, protocol parameter assignment, and root server system management?
A. ANSI
B. IEEE
C. ITU
D. ICANN
Which of the following policies helps in defining what users can and should do to use network and organization's computer equipment?
A. General policy
B. Remote access policy
C. IT policy
D. User policy
Which of the following are the responsibilities of the disaster recovery team? Each correct answer represents a complete solution. Choose all that apply.
A. To monitor the execution of the disaster recovery plan and assess the results
B. To modify and update the disaster recovery plan according to the lessons learned from previous disaster recovery efforts
C. To notify management, affected personnel, and third parties about the disaster
D. To initiate the execution of the disaster recovery procedures
Which of the following is a credit card-sized device used to securely store personal information and used in conjunction with a PIN number to authenticate users?
A. Proximity card
B. Java card
C. SD card
D. Smart card
In an Ethernet peer-to-peer network, which of the following cables is used to connect two computers, using RJ-45 connectors and Category-5 UTP cable?
A. Loopback
B. Serial
C. Parallel
D. Crossover
In which of the following attacks does an attacker use software that tries a large number of key combinations in order to get a password?
A. Buffer overflow
B. Brute force attack
C. Zero-day attack
D. Smurf attack
Which of the following OSI layers establishes, manages, and terminates the connections between the local and remote applications?
A. Data Link layer
B. Network layer
C. Application layer
D. Session layer
Adam, a malicious hacker, is sniffing an unprotected Wi-FI network located in a local store with Wireshark to capture hotmail e-mail traffic. He knows that lots of people are using their laptops for browsing the Web in the store. Adam wants to sniff their e-mail messages traversing the unprotected Wi-Fi network. Which of the following Wireshark filters will Adam configure to display only the packets with hotmail email messages?
A. (http = "login.pass.com") andand (http contains "SMTP")
B. (http contains "email") andand (http contains "hotmail")
C. (http contains "hotmail") andand (http contains "Reply-To")
D. (http = "login.passport.com") andand (http contains "POP3")
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.