Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

312-38Free trialFree trial

By eccouncil
Aug, 2025

Verified

25Q per page

Question 26

Which of the following is a presentation layer protocol?

  • A: TCP
  • B: RPC
  • C: BGP
  • D: LWAPP

Question 27

Which of the following is a session layer protocol?

  • A: RPC
  • B: SLP
  • C: RDP
  • D: ICMP

Question 28

Which of the following layers of the OSI model provides interhost communication?

  • A: Application layer
  • B: Network layer
  • C: Transport layer
  • D: Session layer

Question 29

Which of the following IEEE standards provides specifications for wireless ATM systems?

  • A: 802.1
  • B: 802.5
  • C: 802.3
  • D: 802.11a

Question 30

Which of the following UTP cables supports transmission up to 20MHz?

  • A: Category 2
  • B: Category 5e
  • C: Category 4
  • D: Category 1

Question 31

Which of the following is also known as slag code?

  • A: Trojan
  • B: Logic bomb
  • C: Worm
  • D: IRC bot

Question 32

Which of the following commands is used for port scanning?

  • A: nc -t
  • B: nc -z
  • C: nc -v
  • D: nc -d

Question 33

Which of the following is a term to describe the use of inert gases and chemical agents to extinguish a fire?

  • A: Gaseous fire suppression
  • B: Fire alarm system
  • C: Fire sprinkler
  • D: Fire suppression system

Question 34

Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?

  • A: SuperScan
  • B: Netscan
  • C: Hping
  • D: Nmap

Question 35

Which of the following is a mandatory password-based and key-exchange authentication protocol?

  • A: PPP
  • B: CHAP
  • C: VRRP
  • D: DH-CHAP

Question 36

Which of the following encryption techniques do digital signatures use?

  • A: MD5
  • B: RSA
  • C: Blowfish
  • D: IDEA

Question 37

Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?

  • A: High-interaction honeypot
  • B: Medium-interaction honeypot
  • C: Honeyd
  • D: Low-interaction honeypot

Question 38

Which of the following header fields in TCP/IP protocols involves Ping of Death attack?

  • A: SMTP header field
  • B: TCP header field
  • C: IP header field
  • D: UDP header field

That’s the end of your free questions

You’ve reached the preview limit for 312-38

Consider upgrading to gain full access!

Page 2 of 8 • Questions 26-50 of 189

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!