[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-38 Dumps with VCE and PDF 1-10

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-38
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/312-38.html

EC-Council Network Security Administrator (ENSA)

Question No: 1 – (Topic 1)

John works as a C programmer. He develops the following C program:

#include lt;stdlib.hgt;

#include lt;stdio.hgt;

#include lt;string.hgt; int buffer(char *str) { char buffer1[10]; strcpy(buffer1, str); return 1;

}

int main(int argc, char *argv[]) { buffer (argv[1]); printf(quot;Executed\nquot;);

return 1;

}

His program is vulnerable to a attack.

  1. SQL injection

  2. Denial-of-Service

  3. Buffer overflow

  4. Cross site scripting

Answer: C Explanation:

This program takes a user-supplied string and copies it into #39;buffer1#39;, which can hold up to 10 bytes of data. If a user sends more than 10 bytes, it would result in a buffer overflow.

Question No: 2 DRAG DROP – (Topic 1)

Drag and drop the terms to match with their descriptions.

Ensurepass 2018 PDF and VCE

Answer:

Ensurepass 2018 PDF and VCE

Question No: 3 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term. —————- is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient.

Answer: NetRanger

Question No: 4 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term. A device is used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.

Answer: biometric

Question No: 5 – (Topic 1)

Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.

  1. Wireless sniffer

  2. Spectrum analyzer

  3. Protocol analyzer

  4. Performance Monitor

Answer: A,C Explanation:

Protocol analyzer (also known as a network analyzer, packet analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer) is computer software or computer hardware that can intercept and log traffic passing over a digital network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes and analyzes its content according to the appropriate RFC or other specifications.

Answer option D is incorrect. Performance Monitor is used to get statistical information about the hardware and software components of a server.

Answer option B is incorrect. A spectrum analyzer, or spectral analyzer, is a device that is used to examine the spectral composition of an electrical, acoustic, or optical waveform. It may also measure the power spectrum.

Question No: 6 – (Topic 1)

In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.

  1. The router does not have a configuration file.

  2. There is a need to set operating parameters.

  3. The user interrupts the boot sequence.

  4. The router does not find a valid operating system image.

Answer: C,D Explanation:

The system enters ROM monitor mode if the router does not find a valid operating system image, or if a user interrupts the boot sequence. From ROM monitor mode, a user can boot the device or perform diagnostic tests.

Answer option A is incorrect. If the router does not have a configuration file, it will automatically enter Setup mode when the user switches it on. Setup mode creates an initial configuration.

Answer option B is incorrect. Privileged EXEC is used for setting operating parameters.

Question No: 7 – (Topic 1)

Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?

  1. IGMP

  2. ICMP

  3. EGP

  4. OSPF

Answer: C Explanation:

EGP stands for Exterior Gateway Protocol. It is used for exchanging routing information between two gateways in a network of autonomous systems. This protocol depends upon periodic polling with proper acknowledgements to confirm that network connections are up and running, and to request for routing updates. Each router requests its neighbor at an interval of 120 to 480 seconds, for sending the routing table updates. The neighbor host then responds by sending its routing table. EGP-2 is the latest version of EGP.

Answer option B is incorrect. Internet Control Message Protocol (ICMP) is a maintenance protocol that allows routers and host computers to swap basic control information when

data is sent from one computer to another. It is generally considered a part of the IP layer. It allows the computers on a network to share error and status information. An ICMP message, which is encapsulated within an IP datagram, is very useful to troubleshoot the network connectivity and can be routed throughout the Internet.

Answer option A is incorrect. Internet Group Management Protocol (IGMP) is a communication protocol that multicasts messages and information among all member devices in an IP multicast group. However, multicast traffic is sent to a single MAC address but is processed by multiple hosts. It can be effectively used for gaming and showing online videos. IGMP is vulnerable to network attacks.

Answer option D is incorrect. Open Shortest Path First (OSPF) is a routing protocol that is used in large networks. Internet Engineering Task Force (IETF) designates OSPF as one of the Interior Gateway Protocols. A host uses OSPF to obtain a change in the routing table and to immediately multicast updated information to all the other hosts in the network.

Question No: 8 – (Topic 1)

Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?

  1. Sequence Number

  2. Header Length

  3. Acknowledgment Number

  4. Source Port Address

Answer: D Explanation:

Source Port Address is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment.

Answer option C is incorrect. This is a 32-bit field that identifies the byte number that the sender of the segment is expecting to receive from the receiver.

Answer option B is incorrect. This is a 4-bit field that defines the 4-byte words in the TCP header. The header length can be between 20 and 60 bytes. Therefore, the value of this field can be between 5 and 15.

Answer option A is incorrect. This is a 32-bit field that identifies the number assigned to the first byte of data contained in the segment.

Question No: 9 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term. is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.

Answer: Network reconnaissance

Question No: 10 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate term. The is an application layer protocol that is used between workstations and routers for transporting SNA/NetBIOS traffic over TCP sessions.

Answer: DCAP

100% Ensurepass Free Download!
Download Free Demo:312-38 Demo PDF
100% Ensurepass Free Guaranteed!
312-38 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No