ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

A.
The zombie will not send a response
A.
The zombie will not send a response
Answers
B.
31402
B.
31402
Answers
C.
31399
C.
31399
Answers
D.
31401
D.
31401
Answers
Suggested answer: D

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

A.
Closed
A.
Closed
Answers
B.
Open
B.
Open
Answers
C.
Stealth
C.
Stealth
Answers
D.
Filtered
D.
Filtered
Answers
Suggested answer: B

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

A.
Packet filtering firewall
A.
Packet filtering firewall
Answers
B.
Circuit-level proxy firewall
B.
Circuit-level proxy firewall
Answers
C.
Application-level proxy firewall
C.
Application-level proxy firewall
Answers
D.
Stateful firewall
D.
Stateful firewall
Answers
Suggested answer: D

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

A.
Tracert
A.
Tracert
Answers
B.
Smurf scan
B.
Smurf scan
Answers
C.
Ping trace
C.
Ping trace
Answers
D.
ICMP ping sweep
D.
ICMP ping sweep
Answers
Suggested answer: D

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?

A.
Ping sweep
A.
Ping sweep
Answers
B.
Nmap
B.
Nmap
Answers
C.
Netcraft
C.
Netcraft
Answers
D.
Dig
D.
Dig
Answers
Suggested answer: C

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers: http://172.168.4.131/level/99/exec/show/config

After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

A.
HTTP Configuration Arbitrary Administrative Access Vulnerability
A.
HTTP Configuration Arbitrary Administrative Access Vulnerability
Answers
B.
HTML Configuration Arbitrary Administrative Access Vulnerability
B.
HTML Configuration Arbitrary Administrative Access Vulnerability
Answers
C.
Cisco IOS Arbitrary Administrative Access Online Vulnerability
C.
Cisco IOS Arbitrary Administrative Access Online Vulnerability
Answers
D.
URL Obfuscation Arbitrary Administrative Access Vulnerability
D.
URL Obfuscation Arbitrary Administrative Access Vulnerability
Answers
Suggested answer: A

What is the following command trying to accomplish?

A.
Verify that UDP port 445 is open for the 192.168.0.0 network
A.
Verify that UDP port 445 is open for the 192.168.0.0 network
Answers
B.
Verify that TCP port 445 is open for the 192.168.0.0 network
B.
Verify that TCP port 445 is open for the 192.168.0.0 network
Answers
C.
Verify that NETBIOS is running for the 192.168.0.0 network
C.
Verify that NETBIOS is running for the 192.168.0.0 network
Answers
D.
Verify that UDP port 445 is closed for the 192.168.0.0 network
D.
Verify that UDP port 445 is closed for the 192.168.0.0 network
Answers
Suggested answer: A

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it.

Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?

A.
Passwords of 14 characters or less are broken up into two 7-character hashes
A.
Passwords of 14 characters or less are broken up into two 7-character hashes
Answers
B.
A password Group Policy change takes at least 3 weeks to completely replicate throughout a network
B.
A password Group Policy change takes at least 3 weeks to completely replicate throughout a network
Answers
C.
Networks using Active Directory never use SAM databases so the SAM database pulled was empty
C.
Networks using Active Directory never use SAM databases so the SAM database pulled was empty
Answers
D.
The passwords that were cracked are local accounts on the Domain Controller
D.
The passwords that were cracked are local accounts on the Domain Controller
Answers
Suggested answer: A

An "idle" system is also referred to as what?

A.
PC not connected to the Internet
A.
PC not connected to the Internet
Answers
B.
Zombie
B.
Zombie
Answers
C.
PC not being used
C.
PC not being used
Answers
D.
Bot
D.
Bot
Answers
Suggested answer: B

Larry is an IT consultant who works for corporations and government agencies. Larry plans on shutting down the city's network using BGP devices and zombies? What type of Penetration Testing is Larry planning to carry out?

A.
Router Penetration Testing
A.
Router Penetration Testing
Answers
B.
DoS Penetration Testing
B.
DoS Penetration Testing
Answers
C.
Firewall Penetration Testing
C.
Firewall Penetration Testing
Answers
D.
Internal Penetration Testing
D.
Internal Penetration Testing
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71