Free 312-38 Exam Braindumps (page: 19)

Page 18 of 155

Which of the following statements are NOT true about the FAT16 file system? Each correct answer represents a complete solution. Choose all that apply.

  1. It does not support file-level security.
  2. It works well with large disks because the cluster size increases as the disk partition size increases.
  3. It supports the Linux operating system.
  4. It supports file-level compression.

Answer(s): B,D

Explanation:

The FAT16 file system was developed for disks larger than 16MB. It uses 16-bit allocation table entries. The FAT16 file system supports all Microsoft operating systems. It also supports OS/2 and Linux.
Answer options C and A are incorrect. All these statements are true about the FAT16 file system.



FILL BL ANK
Fill in the blank with the appropriate term. The _____________is used for routing voice conversations over the Internet. It is also known by other names such as IP Telephony, Broadband Telephony, etc.

  1. VoIP

Answer(s): A

Explanation:

The Voice over Internet Protocol (VoIP) is used for routing of voice conversation over the Internet. The VoIP is also known by other names such as IP Telephony, Broadband Telephony, etc. Analog signals are used in telephones in which the sound is received as electrical pulsation, which is amplified and then carried to a small loudspeaker attached to the other phone, and the call receiver can hear the sound. In VoIP, analog signals are changed into digital signals, which are transmitted on the Internet. VoIP is used to make free phone calls using an Internet connection, and this can be done by using any VoIP software available in the market.
There are various modes for making phone calls through the Internet. Some of the important modes are as follows:
Through Analog Telephone Adapter (ATA)
In this mode, the traditional phone is attached to the computer through ATA.
ATA receives analog signals from the phone and then converts these signals to digital signals. The digital signals are then received by the Internet Service Providers (ISP), and the system is ready to make calls over VoIP.

Through IP Phone
IP Phones look exactly like the traditional phones, but they differ in that they have RJ-45 Ethernet connectors, instead of RJ-11 phone connectors, for connecting to the computers.

Computer To Computer
This is the easiest way to use VoIP. For this, we need software, microphone, speakers, sound card and an Internet connection through a cable or a DSL modem.

Soft Phones
Soft phone is a software application that can be loaded onto a computer and used anywhere in the broadband connectivity area.



FILL BLANK
Fill in the blank with the appropriate term. The________________protocol is a feature of packet-based data transmission protocols. It is used to keep a record of the frame sequences sent and their respective acknowledgements received by both the users.

  1. Sliding Window

Answer(s): A

Explanation:

The Sliding Window protocol is a feature of packet-based data transmission protocols. It is used in the data link layer (OSI model) as well as in TCP (transport layer of the OSI model). It is used to keep a record of the frame sequences sent, and their respective acknowledgements received, by both the users. Its additional feature over a simpler protocol is that can allow multiple packets to be "in transmission" simultaneously, rather than waiting for each packet to be acknowledged before sending the next.In transmit flow control, sliding window is a variable-duration window that allows a sender to transmit a specified number of data units before an acknowledgment is received or before a specified event occurs.An example of a sliding window is one in which, after the sender fails to receive an acknowledgment for the first transmitted frame, the sender "slides" the window, i.e., resets the window, and sends a second frame. This process is repeated for the specified number of times before the sender interrupts transmission. Sliding window is sometimes called acknowledgment delay period.



FILL BLANK
Fill in the blank with the appropriate term. A________________is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers.

  1. rootkit

Answer(s): A

Explanation:

A rootkit is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers. A rootkit requires root access to be installed in the Linux operating system, but once installed, the attacker can get root access at any time. Rootkits have the following features:
They allow an attacker to run packet sniffers secretly to capture passwords.
They allow an attacker to set a Trojan into the operating system and thus open a backdoor for anytime access. They allow an attacker to replace utility programs that can be used to detect the attacker's activity.
They provide utilities for installing Trojans with the same attributes as legitimate programs.






Post your Comments and Discuss EC-Council 312-38 exam with other Community members:

312-38 Discussions & Posts