Free 312-38 Exam Braindumps (page: 26)

Page 25 of 155

Which of the following examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations?

  1. Network Behavior Analysis
  2. Network-based Intrusion Prevention
  3. Wireless Intrusion Prevention System
  4. Host-based Intrusion Prevention

Answer(s): A

Explanation:

Network Behavior Analysis examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service (DDoS) attacks, certain forms of malware, and policy violations.
Answer option B is incorrect. Network-based Intrusion Prevention (NIPS) monitors the entire network for suspicious traffic by analyzing protocol activity.
Answer option C is incorrect. Wireless Intrusion Prevention System (WIPS) monitors a wireless network for suspicious traffic by analyzing wireless networking protocols.
Answer option D is incorrect. Host-based Intrusion Prevention (HIPS) is an installed software package that monitors a single host for suspicious activity by analyzing events occurring within that host.



Which of the following routing metrics refers to the length of time that is required to move a packet from source to destination through the internetwork?

  1. Routing delay
  2. Bandwidth
  3. Load
  4. Path length

Answer(s): A

Explanation:

Routing delay refers to the length of time that is required to move a packet from source to destination through the internetwork. Delay depends on many factors, including the following:
Bandwidth of intermediate network links Port queues at each router along the way
Network congestion on all intermediate network links Physical distance to be traveled
Since delay is a conglomeration of several important variables, it is a common and useful metric.
Answer option D is incorrect. Path length is defined as the sum of the costs associated with each link traversed. Answer option B is incorrect. Bandwidth refers to the available traffic capacity of a link.
Answer option C is incorrect. Load refers to the degree to which a network resource, such as a router, is busy.



FILL BLANK
Fill in the blank with the appropriate term. The______________ model is a description framework for computer network protocols and is sometimes called the Internet Model or the DoD Model.

  1. TCP/IP

Answer(s): A

Explanation:

The TCP/IP model is a description framework for computer network protocols. It describes a set of general design guidelines and implementations of specific networking protocols to enable computers to communicate over a network. TCP/IP provides end-to-end connectivity specifying how data should be formatted, addressed, transmitted, routed and received at the destination. Protocols exist for a variety of different types of communication services between computers. The TCP/IP Model is sometimes called the Internet Model or the DoD Model. The TCP/IP model has four unique layers as shown in the image. This layer architecture is often compared with the seven-layer OSI Reference Model. The TCP/IP model and related protocols are maintained by the Internet Engineering Task Force (IETF).



FILL BLANK
Fill in the blank with the appropriate term. A____________ is a block of data that a Web server stores on the client computer.

  1. cookie

Answer(s): A

Explanation:

Cookie is a block of data, which a Web server stores on the client computer. If no expiration date is set for the cookie, it expires when the browser closes. If the expiration date is set for a future date, the cookie will be stored on the client's disk after the session ends. If the expiration date is set for a past date, the cookie is deleted.






Post your Comments and Discuss EC-Council 312-38 exam with other Community members:

312-38 Discussions & Posts