In which of the following types of port scans does the scanner attempt to connect to all 65535 ports?
A. UDP
B. Strobe
C. FTP bounce
D. Vanilla
Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?
A. HIDS
B. IPS
C. DMZ
D. NIDS
Which of the following can be performed with software or hardware devices in order to record everything a person types using his or her keyboard?
A. Warchalking
B. Keystroke logging
C. War dialing
D. IRC bot
Which of the following is a firewall that keeps track of the state of network connections traveling across it?
A. Stateful firewall
B. Stateless packet filter firewall
C. Circuit-level proxy firewall
D. Application gateway firewall
Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall? Each correct answer represents a complete solution. Choose all that apply.
A. Circuit-level gateway
B. Stateful
C. Proxy server
D. Dynamic packet-filtering
Which of the following statements are true about volatile memory? Each correct answer represents a complete solution. Choose all that apply.
A. Read-Only Memory (ROM) is an example of volatile memory.
B. The content is stored permanently, and even the power supply is switched off.
C. The volatile storage device is faster in reading and writing data.
D. It is computer memory that requires power to maintain the stored information.
Which of the following tools is a free laptop tracker that helps in tracking a user's laptop in case it gets stolen?
A. SAINT
B. Adeona
C. Snort
D. Nessus
Which of the following statements are NOT true about the FAT16 file system? Each correct answer represents a complete solution. Choose all that apply.
A. It does not support file-level security.
B. It works well with large disks because the cluster size increases as the disk partition size increases.
C. It supports the Linux operating system.
D. It supports file-level compression.
Which of the following standards is an amendment to the original IEEE 802.11 and specifies security mechanisms for wireless networks?
A. 802.11b
B. 802.11e
C. 802.11i
D. 802.11a
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer and logs activities of the network that is matched with the predefined signatures?
A. Dsniff
B. KisMAC
C. Snort
D. Kismet
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 312-38 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.