New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Effective Study Techniques for the ECCouncil 312-38 Exam

Questions 21

Eric is receiving complaints from employees that their systems are very slow and experiencing odd issues including restarting automatically and frequent system hangs. Upon investigating, he is convinced the systems

are infected with a virus that forces systems to shut down automatically after period of time. What type of security incident are the employees a victim of?

Options:
A.

Scans and probes

B.

Malicious Code

C.

Denial of service

D.

Distributed denial of service

ECCouncil 312-38 Premium Access
Questions 22

Which of the following intrusion detection techniques observes the network for abnormal usage patterns by determining the performance parameters for regular activities and monitoring for actions

beyond the normal parameters?

Options:
A.

Signature/Pattern matching

B.

Stateful protocol analysis

C.

None of these

D.

Statistical anomaly detection

Questions 23

Which OSI layer does a Network Interface Card (NIC) work on?

Options:
A.

Physical layer

B.

Presentation layer

C.

Network layer

D.

Session layer

Questions 24

An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then

upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?

Options:
A.

Bruteforce

B.

Rainbow table

C.

Hybrid

D.

Dictionary

Questions 25

Richard has been working as a Linux system administrator at an MNC. He wants to maintain a productive and secure environment by improving the performance of the systems through Linux patch management. Richard is using Ubuntu and wants to patch the Linux systems manually. Which among the following command installs updates (new ones) for Debun based Linux OSes?

Options:
A.

sudo apt-get dist-upgrade

B.

sudo apt-get update

C.

sudo apt-get dist-update

D.

sudo apt-get upgrate

Questions 26

Which of the following connects the SDN controller and SDN networking devices and relays information from network services to network devices such as switches and routers?

Options:
A.

Eastbound API

B.

Northbound API

C.

Southbound API

D.

Westbound API

Questions 27

Liza was told by her network administrator that they will be implementing IPsec VPN tunnels to connect the branch locations to the main office. What layer of the OSI model do IPsec tunnels function on?

Options:
A.

The data link layer

B.

The session layer

C.

The network layer

D.

The application and physical layers

Questions 28

The network admin decides to assign a class B IP address to a host in the network. Identify which of the following addresses fall within a class B IP address range.

Options:
A.

255.255.255.0

B.

18.12.4.1

C.

172.168.12.4

D.

169.254.254.254

Questions 29

Sam, a network administrator is using Wireshark to monitor the network traffic of the organization. He wants to detect TCP packets with no flag set to check for a specific attack attempt. Which filter will he use to view

the traffic?

Options:
A.

Tcp.flags==0x000

B.

Tcp.flags==0000x

C.

Tcp.flags==000x0

D.

Tcp.flags==x0000

Questions 30

Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:

Options:
A.

Cloud to service attack surface

B.

User to service attack surface

C.

User to cloud attack surface

D.

Cloud to user attack surface