Free 312-38 Exam Braindumps (page: 41)

Page 40 of 155

Which of the following transmission modes of communication is one-way?

  1. Half duplex
  2. full-duplex mode
  3. #NAME?
  4. root mode
  5. None

Answer(s): A



Which of the following is designed to detect unwanted changes by observing the flame of the environment associated with combustion?

  1. Fire extinguishing system
  2. None
  3. Gaseous fire-extinguishing systems
  4. sprinkler
  5. Smoke alarm system

Answer(s): E



Which of the following features is used to generate spam on the Internet by spammers and worms?

  1. AutoComplete
  2. SMTP relay
  3. Server Message Block (SMB) signing
  4. AutoFill

Answer(s): B

Explanation:

SMTP relay feature of e-mail servers allows them to forward e-mail to other e-mail servers. Unfortunately, this feature is exploited by spammers and worms to generate spam on the Internet.



Which of the following tools is described below? It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

  1. Dsniff
  2. Cain
  3. Libnids
  4. LIDS

Answer(s): A

Explanation:

Dsniff is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of the tools of Dsniff include dsniff, arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. Dsniff is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.
Answer option B is incorrect. Cain is a multipurpose tool that can be used to perform many tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing. This password cracking program can perform the following types of password cracking attacks:
Dictionary attack Brute force attack Rainbow attack Hybrid attack
Answer options D and C are incorrect. These tools are port scan detection tools that are used in the Linux operating system.






Post your Comments and Discuss EC-Council 312-38 exam with other Community members:

312-38 Discussions & Posts