With which of the following forms of acknowledgment can the sender be informed by the data receiver about all segments that have arrived successfully?
A. Block Acknowledgment
B. Negative Acknowledgment
C. Cumulative Acknowledgment
D. Selective Acknowledgment
Which of the following are the distance-vector routing protocols? Each correct answer represents a complete solution. Choose all that apply.
A. IS-IS
B. OSPF
C. IGRP
D. RIP
Which of the following types of cyberstalking damages the reputation of their victim and turns other people against them by setting up their own Websites, blogs, or user pages for this purpose?
A. False accusation
B. Attempts to gather information about the victim
C. Encouraging others to harass the victim
D. False victimization
You work as the network administrator for uCertify Inc. The company has planned to add the support for IPv6 addressing. The initial phase deployment of IPv6 requires support from some IPv6-only devices. These devices need to access servers that support only IPv4. Which of the following tools would be suitable to use?
A. Multipoint tunnels
B. NAT-PT
C. Point-to-point tunnels
D. Native IPv6
Which of the following is a management process that provides a framework for promoting quick recovery and the capability for an effective response to protect the interests of its brand, reputation, and stakeholders?
A. Log analysis
B. Incident handling
C. Business Continuity Management
D. Patch management
Which of the following IP class addresses are not allotted to hosts? Each correct answer represents a complete solution. Choose all that apply.
A. Class A
B. Class B
C. Class D
D. Class E
E. Class C
Which of the following organizations is responsible for managing the assignment of domain names and IP addresses?
A. ISO
B. ICANN
C. W3C
D. ANSI
Which of the following recovery plans includes specific strategies and actions to deal with specific variances to assumptions resulting in a particular security problem, emergency, or state of affairs?
A. Contingency plan
B. Disaster recovery plan
C. Business continuity plan
D. Continuity of Operations Plan
Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?
A. Replay
B. Fire walking
C. Cross site scripting
D. Session fixation
Which of the following examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations?
A. Network Behavior Analysis
B. Network-based Intrusion Prevention
C. Wireless Intrusion Prevention System
D. Host-based Intrusion Prevention
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.