John works as a C programmer. He develops the following C program:His program is vulnerable to a__________ attack.
Answer(s): C
This program takes a user-supplied string and copies it into 'buffer1', which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.
DRAG DROP (Drag and Drop is not supported)Drag and drop the terms to match with their descriptions.Select and Place:
Answer(s): A
Following are the terms with their descriptions:A Trojan horse is a malicious software program that contains hidden code and masquerades itself as a normal program. When a Trojan horse program is run, its hidden code runs to destroy or scramble data on the hard disk. An example of a Trojan horse is a program that masquerades as a computer logon to retrieve user names and password information. The developer of a Trojan horse can use this information later to gain unauthorized access to computers. Trojan horses are normally spread by e-mail attachments. Ping sweep is a technique used to determine which of a range of IP addresses map to live hosts. It consists of ICMP ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. A ping is often used to check that a network device is functioning. To disable ping sweeps on a network, administrators can block ICMP ECHO requests from outside sources. However, ICMP TIMESTAMP and ICMP INFO can be used in a similar manner. Spamware is software designed by or for spammers to send out automated spam e-mail. Spamware is used to search for e-mail addresses to build lists of e-mail addresses to be used either for spamming directly or to be sold to spammers. The spamware package also includes an e-mail harvesting tool. A backdoor is any program that allows a hacker to connect to a computer without going through the normal authentication process. The main advantage of this type of attack is that the network traffic moves from inside a network to the hacker's computer. The traffic moving from inside a network to the outside world is typically the least restrictive, as companies are more concerned about what comes into a network, rather than what leaves it. It, therefore, becomes hard to detect backdoors.
FILL BLANKFill in the blank with the appropriate term. ________________ is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient.
NetRanger is the complete network configuration and information toolkit that includes the following tools: a Ping tool, Trace Route tool, Host Lookup tool, Internet time synchronizer, Whois tool, Finger Unix hosts tool, Host and port scanning tool, check multiple POP3 mail accounts tool, manage dialup connections tool, Quote of the day tool, and monitor Network Settings tool. These tools are integrated in order to use an application interface with full online help. NetRanger is designed for both new and experienced users. This tool is used to help diagnose network problems and to get information about users, hosts, and networks on the Internet or on a user computer network. NetRanger uses multi-threaded and multi-connection technologies in order to be very fast and efficient.
FILL BLANKFill in the blank with the appropriate term. A________________ device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.
A biometric device is used for uniquely recognizing humans based upon one or more intrinsic, physical, or behavioral traits.Biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric characteristics can be divided into two main classes:1. Physiological: These devices are related to the shape of the body. These are not limited to the fingerprint, face recognition, DNA, hand and palm geometry, and iris recognition, which has largely replaced the retina and odor/scent.2. Behavioral: These are related to the behavior of a person. They are not limited to the typing rhythm, gait, and voice.
Post your Comments and Discuss EC-Council 312-38 exam prep with other Community members:
Mohammed Commented on July 21, 2025 Good questions Anonymous
meep Commented on March 01, 2025 meep meepmeep meepmeep meepmeep meepmeep meep UNITED KINGDOM
Mohammed Commented on March 01, 2025 I want to let you know that I passed this test yesterday. These questions are valid as of this week. UNITED ARAB EMIRATES
Kuwan Commented on December 23, 2024 Have you recently taken a certification exam? Your experience can help others! ?? Was the exam harder or easier than expected? ?? Any tricky topics or surprises? ?? What study methods worked best for you? Drop your thoughts below and help future test-takers succeed! UNITED STATES
Bryan Commented on August 22, 2023 Big thanks to AllBrainDumps for providing such a great resource, helping me preparing to achieve my goal, saving lots of time! TAIWAN PROVINCE OF CHINA
We’re offering these study questions to support your success. The least you can do? Drop a useful comment about each question. Help others. Build the community.