Free 312-38 Exam Braindumps (page: 73)

Page 72 of 155

Which of the following is a malicious program that looks like a normal program?

  1. Impersonation
  2. Worm
  3. Virus
  4. Trojan horse

Answer(s): D



Which of the following is an IPSec protocol that can be used alone in combination with Authentication Header (AH)?

  1. L2TP
  2. PPTP
  3. ESP
  4. PPP

Answer(s): C



Which of the following attacks combines dictionary and brute force attacks?

  1. Replay attack
  2. Man-in-the-middle attack
  3. Hybrid attack
  4. Phishing attack

Answer(s): C



Which of the following attacks comes under the category of an active attack?

  1. Replay attack
  2. Wireless footprinting
  3. Passive Eavesdropping
  4. Traffic analysis

Answer(s): A






Post your Comments and Discuss EC-Council 312-38 exam with other Community members:

312-38 Exam Discussions & Posts