Question 6 of 532
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
    Correct Answer: C, D

    The system enters ROM monitor mode if the user interrupts the boot sequence or if the router does not find a valid operating system image. ROM monitor mode is used to perform diagnostic tests or to boot the device. If the router does not have a configuration file, it will enter Setup mode to create an initial configuration. Setting operating parameters is done in Privileged EXEC mode.

Question 7 of 532
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
    Correct Answer: D

    The Source Port Address is a 16-bit field in the TCP header that identifies the source port number of the application program in the host that is sending the segment. This field helps the receiving system know which application on the sender’s system sent the data. Other fields such as the Sequence Number, Header Length, and Acknowledgment Number have different purposes related to data sequencing, header length specification, and acknowledgment of received data, respectively.

Question 8 of 532
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:
`It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.`
Which of the following tools is John using to crack the wireless encryption keys?
    Correct Answer: C
    AirSnort is a Linux-based WLAN WEP cracking tool that recovers encryption keys. AirSnort operates by passively monitoring transmissions. It uses Ciphertext
    Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.
    Answer option B is incorrect. Kismet is a Linux-based 802.11 wireless network sniffer and intrusion detection system. It can work with any wireless card that supports raw monitoring (rfmon) mode. Kismet can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet can be used for the following tasks:
    To identify networks by passively collecting packets
    To detect standard named networks

    To detect masked networks -
    To collect the presence of non-beaconing networks via data traffic
    Answer option D is incorrect. Cain is a multipurpose tool that can be used to perform many tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing. This password cracking program can perform the following types of password cracking attacks:

    Dictionary attack -

    Brute force attack -

    Rainbow attack -

    Hybrid attack -
    Answer option A is incorrect. PsPasswd is a tool that helps Network Administrators change an account password on the local or remote system. The command syntax of PsPasswd is as follows: pspasswd [\\computer[,computer[,..] | @file [-u user [-p psswd]] Username [NewPassword]
    Exam 312-38: Question 8 - Image 1 C
Question 9 of 532
Which of the following is a process that detects a problem, determines its cause, minimizes the damages, resolves the problem, and documents each step of response for future reference?
    Correct Answer: A

Question 10 of 532
Which of the following is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion?
    Correct Answer: C