Free 312-49 Exam Braindumps (page: 40)

Page 39 of 133

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

  1. ATM
  2. UDP
  3. BPG
  4. OSPF

Answer(s): D



What is the target host IP in the following command?

  1. 172.16.28.95
  2. 10.10.150.1
  3. Firewalk does not scan target hosts
  4. This command is using FIN packets, which cannot scan target hosts

Answer(s): A



George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used.
What IDS feature must George implement to meet this requirement?

  1. Signature-based anomaly detection
  2. Pattern matching
  3. Real-time anomaly detection
  4. Statistical-based anomaly detection

Answer(s): C



John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

  1. Firewalk cannot pass through Cisco firewalls
  2. Firewalk sets all packets with a TTL of zero
  3. Firewalk cannot be detected by network sniffers
  4. Firewalk sets all packets with a TTL of one

Answer(s): D






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts