ECCouncil 312-38 - Certified Network Defender Exam
Page: 2 / 124
Total 617 questions
Question #6 (Topic: Single Topic)
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
A. The router does not have a configuration file.
B. There is a need to set operating parameters.
C. The user interrupts the boot sequence.
D. The router does not find a valid operating system image.
Answer: DC
Question #7 (Topic: Single Topic)
Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?
A. IGMP
B. ICMP
C. EGP
D. OSPF
Answer: C
Question #8 (Topic: Single Topic)
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
A. Sequence Number
B. Header Length
C. Acknowledgment Number
D. Source Port Address
Answer: D
Question #9 (Topic: Single Topic)
FILL BLANK
Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a
network on which it is not authorized or allowed.
Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a
network on which it is not authorized or allowed.
Answer: Network reconnaissance
Question #10 (Topic: Single Topic)
FILL BLANK
Fill in the blank with the appropriate term. The _____________is an application layer protocol that is used between workstations and routers for transporting SNA/
NetBIOS traffic over TCP sessions.
Fill in the blank with the appropriate term. The _____________is an application layer protocol that is used between workstations and routers for transporting SNA/
NetBIOS traffic over TCP sessions.
Answer: DCAP