Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
312-38
Free trial
Verified
Question 26
Which of the following is a presentation layer protocol?
- A: TCP
- B: RPC
- C: BGP
- D: LWAPP
Question 27
Which of the following is a session layer protocol?
- A: RPC
- B: SLP
- C: RDP
- D: ICMP
Question 28
Which of the following layers of the OSI model provides interhost communication?
- A: Application layer
- B: Network layer
- C: Transport layer
- D: Session layer
Question 29
Which of the following IEEE standards provides specifications for wireless ATM systems?
- A: 802.1
- B: 802.5
- C: 802.3
- D: 802.11a
Question 30
Which of the following UTP cables supports transmission up to 20MHz?
- A: Category 2
- B: Category 5e
- C: Category 4
- D: Category 1
Question 31
Which of the following is also known as slag code?
- A: Trojan
- B: Logic bomb
- C: Worm
- D: IRC bot
Question 32
Which of the following commands is used for port scanning?
- A: nc -t
- B: nc -z
- C: nc -v
- D: nc -d
Question 33
Which of the following is a term to describe the use of inert gases and chemical agents to extinguish a fire?
- A: Gaseous fire suppression
- B: Fire alarm system
- C: Fire sprinkler
- D: Fire suppression system
Question 34
Which of the following tools is used to ping a given range of IP addresses and resolve the host name of the remote system?
- A: SuperScan
- B: Netscan
- C: Hping
- D: Nmap
Question 35
Which of the following is a mandatory password-based and key-exchange authentication protocol?
- A: PPP
- B: CHAP
- C: VRRP
- D: DH-CHAP
Question 36
Which of the following encryption techniques do digital signatures use?
- A: MD5
- B: RSA
- C: Blowfish
- D: IDEA
Question 37
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?
- A: High-interaction honeypot
- B: Medium-interaction honeypot
- C: Honeyd
- D: Low-interaction honeypot
Question 38
Which of the following header fields in TCP/IP protocols involves Ping of Death attack?
- A: SMTP header field
- B: TCP header field
- C: IP header field
- D: UDP header field
That’s the end of your free questions
You’ve reached the preview limit for 312-38Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!