Free 412-79 Exam Braindumps (page: 14)

Page 13 of 52

TCP/IP provides a broad range of communication protocols for the various applications on the network. The TCP/IP model has four layers with major protocols included within each layer.
Which one of the following protocols is used to collect information from all the network devices?

  1. Simple Network Management Protocol (SNMP)
  2. Network File system (NFS)
  3. Internet Control Message Protocol (ICMP)
  4. Transmission Control Protocol (TCP)

Answer(s): A



The term social engineering is used to describe the various tricks used to fool people (employees, business partners, or customers) into voluntarily giving away information that would not normally be known to the general public.



What is the criminal practice of social engineering where an attacker uses the telephone system in an attempt to scam the user into surrendering private information?

  1. Phishing
  2. Spoofing
  3. Tapping
  4. Vishing

Answer(s): D



What is the maximum value of a "tinyint" field in most database systems?

  1. 222
  2. 224 or more
  3. 240 or less
  4. 225 or more

Answer(s): D



After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, statefull firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet.
Why is that?

  1. IPSEC does not work with packet filtering firewalls
  2. NAT does not work with IPSEC
  3. NAT does not work with statefull firewalls
  4. Statefull firewalls do not work with packet filtering firewalls

Answer(s): B






Post your Comments and Discuss EC-Council 412-79 exam with other Community members: