Which of the following steps of the OPSEC process examines each aspect of the planned operation to identify OPSEC indicators that could reveal critical information and then compare those indicators with the adversary's intelligence collection capabilities identified in the previous action?
A. Analysis of Threats
B. Analysis of Vulnerabilities
C. Assessment of Risk
D. Identification of Critical Information
E. Application of Appropriate OPSEC Measures
In which of the following attacks do computers act as zombies and work together to send out bogus messages, thereby increasing the amount of phony traffic?
A. Smurf attack
B. Buffer-overflow attack
C. DDoS attack
D. Bonk attack
Which of the following is a communication protocol that multicasts messages and information among all member devices in an IP multicast group?
A. ICMP
B. IGMP
C. BGP
D. EGP
Attacks are classified into which of the following? Each correct answer represents a complete solution. Choose all that apply.
A. Active attack
B. Session hijacking
C. Passive attack
D. Replay attack
Which of the following is a technique for gathering information about a remote network protected by a firewall?
A. Firewalking
B. Warchalking
C. Wardriving
D. Wardialing
Which of the following is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end-user client applications?
A. NNTP
B. BOOTP
C. DCAP
D. NTP
Which of the following attacks is a class of brute force attacks that depends on the higher likelihood of collisions found between random attack attempts and a fixed degree of permutations?
A. Phishing attack
B. Replay attack
C. Birthday attack
D. Dictionary attack
Which of the following is a digital telephone/telecommunication network that carries voice, data, and video over an existing telephone network infrastructure?
A. PPP
B. Frame relay
C. ISDN
D. X.25
Which of the following policies to help define what users can and should do to use the network and organization of computer equipment?
A. None
B. IT policy
C. user policy
D. general policy
E. remote access policy
Which of the following is a class of attacks to break through, which depends on a greater probability of collisions between random attack was detected, and try to fixed rate permutations?
A. Dictionary attack
B. None
C. birthday attack
D. phishing attack
E. replay attack
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.