Free 312-49 Exam Braindumps (page: 41)

Page 40 of 133

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?

  1. Enable direct broadcasts
  2. Disable direct broadcasts
  3. Disable BGP
  4. Enable BGP

Answer(s): B



George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

  1. Nessus is too loud
  2. Nessus cannot perform wireless testing
  3. Nessus is not a network scanner
  4. There are no ways of performing a "stealthy" wireless scan

Answer(s): A



At what layer of the OSI model do routers function on?

  1. 4
  2. 3
  3. 1
  4. 5

Answer(s): B



Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

  1. APIPA
  2. IANA
  3. CVE
  4. RIPE

Answer(s): C






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts