[Free] 2017(Sep) EnsurePass Examcollection ECCouncil 312-38 Dumps with VCE and PDF 61-70

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep ECCouncil Official New Released 312-38
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/312-38.html

EC-Council Network Security Administrator (ENSA)

Question No: 61 – (Topic 1)

Which of the following can be performed with software or hardware devices in order to record everything a person types using his keyboard?

  1. Warchalking

  2. Keystroke logging

  3. War dialing

  4. IRC bot

Answer: B Explanation:

Keystroke logging is a method of logging and recording user keystrokes. It can be performed with software or hardware devices. Keystroke logging devices can record

everything a person types using his keyboard, such as to measure employee#39;s productivity on certain clerical tasks. These types of devices can also be used to get usernames, passwords, etc.

Answer option C is incorrect. War dialing is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, BBS systems, and fax machines. Hackers use the resulting lists for various purposes, hobbyists for exploration, and crackers (hackers that specialize in computer security) for password guessing.

Answer option A is incorrect. Warchalking is the drawing of symbols in public places to advertise an open Wi-Fi wireless network. Having found a Wi-Fi node, the warchalker draws a special symbol on a nearby object, such as a wall, the pavement, or a lamp post. The name warchalking is derived from the cracker terms war dialing and war driving.

Answer option D is incorrect. An Internet Relay Chat (IRC) bot is a set of scripts or an independent program that connects to Internet Relay Chat as a client, and so appears to other IRC users as another user. An IRC bot differs from a regular client in that instead of providing interactive access to IRC for a human user, it performs automated functions.

Question No: 62 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term.

A is a translation device or service that is often controlled by a separate Media Gateway Controller, which provides the call control and signaling functionality.

Answer: Media gateway

Question No: 63 – (Topic 1)

Which of the following tools is a free laptop tracker that helps in tracking a user#39;s laptop in case it gets stolen?

  1. SAINT

  2. Adeona

  3. Snort

  4. Nessus

Answer: B Explanation:

Adeona is a free laptop tracker that helps in tracking a user#39;s laptop in case it gets stolen. All it takes is to install the Adeona software client on the user#39;s laptop, pick a password, and make it run in the background. If at one point, the user#39;s laptop gets stolen and is connected to the Internet, the Adeona software sends the criminal#39;s IP address. Using the Adeona Recovery, the IP address can then be retrieved. Knowing the IP address helps in tracking the geographical location of the stolen device.

Answer option D is incorrect. Nessus is proprietary comprehensive vulnerability scanning software. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on tested systems. It is capable of checking various types of vulnerabilities, some of which are as follows:Vulnerabilities that allow a remote cracker to control or access sensitive data on a system Misconfiguration (e.g. open mail relay, missing patches, etc)Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.Denials of service against the TCP/IP stack by using mangled packets

Answer option A is incorrect. SAINT stands for System Administrator#39;s Integrated Network Tool. It is computer software used for scanning computer networks for security vulnerabilities, and exploiting found vulnerabilities. The SAINT scanner screens every live system on a network for TCP and UDP services. For each service it finds running, it launches a set of probes designed to detect anything that could allow an attacker to gain unauthorized access, create a denial-of-service, or gain sensitive information about the network.

Answer option C is incorrect. Snort is an open source network intrusion detection system. The Snort application analyzes network traffic in realtime mode. It performs packet sniffing, packet logging, protocol analysis, and a content search to detect a variety of potential attacks.

Question No: 64 DRAG DROP – (Topic 1)

Drag and drop the Response management plans to match up with their respective purposes.

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 65 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term. is a free open-source utility for

network exploration and security auditing that is used to discover computers and services on a computer network, thus creating a quot;mapquot; of the network.

Answer: Nmap

Question No: 66 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term. is a powerful and low- interaction open source honeypot.

Answer: Honeyd

Question No: 67 – (Topic 1)

Which of the following statements are true about volatile memory?Each correct answer represents a complete solution. Choose all that apply.

  1. Read only memory (ROM) is an example of volatile memory.

  2. The content is stored permanently and even the power supply is switched off.

  3. A volatile storage device is faster in reading and writing data.

  4. It is computer memory that requires power to maintain the stored information.

Answer: C,D Explanation:

Volatile memory, also known as volatile storage, is computer memory that requires power to maintain the stored information, unlike non-volatile memory which does not require a maintained power supply. It has been less popularly known as temporary memory. Most forms of modern random access memory (RAM) are volatile storage, including dynamic random access memory (DRAM) and static random access memory (SRAM). A volatile storage device is faster in reading and writing data.Answer options B and A are incorrect. Non-volatile memory, nonvolatile memory, NVM, or non-volatile storage, in the most basic sense, is computer memory that can retain the stored information even when not powered. Examples of non-volatile memory include read-only memory, flash memory, most types of magnetic computer storage devices (e.g. hard disks, floppy disks, and magnetic tape), optical discs, and early computer storage methods such as paper tape and punched cards.

Question No: 68 – (Topic 1)

Which of the following firewalls are used to track the state of active connections and determine the network packets allowed to enter through the firewall?Each correct answer represents a complete solution. Choose all that apply.

  1. Circuit-level gateway

  2. Stateful

  3. Proxy server

  4. Dynamic packet-filtering

Answer: B,D Explanation:

A dynamic packet-filtering firewall is a fourth generation firewall technology. It is also known as a stateful firewall. It tracks the state of active connections and determines which network packets are allowed to enter through the firewall. It records session information, such as IP addresses and port numbers to implement a more secure network. The dynamic packet- filtering firewall operates at Layer3, Layer4, and Layer5.

Answer option A is incorrect. A circuit-level gateway is a type of firewall that works at the session layer of the OSI model between the application layer and the transport layer of the TCP/IP stack. They monitor TCP handshaking between packets to determine whether a requested session is legitimate. Information passed to a remote computer through a circuit level gateway appears to have originated from the gateway. This is useful for hiding information about protected networks. Circuit-level gateways are relatively inexpensive and have the advantage of hiding information about the private network they protect.

Answer option C is incorrect. A proxy server firewall intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.

Question No: 69 – (Topic 1)

Which of the following statements are NOT true about the FAT16 file system?Each correct

answer represents a complete solution. Choose all that apply.

  1. It does not support file-level security.

  2. It works well with large disks because the cluster size increases as the disk partition size increases.

  3. It supports the Linux operating system.

  4. It supports file-level compression.

Answer: B,D Explanation:

The FAT16 file system was developed for disks larger than 16MB. It uses 16-bit allocation table entries. The FAT16 file system supports all Microsoft operating systems. It also supports OS/2 and Linux.

Answer options C and A are incorrect. All these statements are true about the FAT16 file system.

Question No: 70 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term. The is used for routing voice conversations over the Internet. It is also known by other names such as IP Telephony, Broadband Telephony, etc.

Answer: VoIP

100% Ensurepass Free Download!
Download Free Demo:312-38 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass 312-38 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.