ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 16

Add to Whishlist

List of questions

Question 151

Report Export Collapse

John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends

Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?

Become a Premium Member for full access
  Unlock Premium Member

Question 152

Report Export Collapse

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.

Bill protects the PDF documents with a password and sends them to their intended recipients.

Why PDF passwords do not offer maximum protection?

Become a Premium Member for full access
  Unlock Premium Member

Question 153

Report Export Collapse

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?

Become a Premium Member for full access
  Unlock Premium Member

Question 154

Report Export Collapse

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

Become a Premium Member for full access
  Unlock Premium Member

Question 155

Report Export Collapse

What is the target host IP in the following command?

Become a Premium Member for full access
  Unlock Premium Member

Question 156

Report Export Collapse

George is a senior security analyst working for a state agency in Florid a. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used.

What IDS feature must George implement to meet this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 157

Report Export Collapse

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by

Firewalk. Why is that?

Become a Premium Member for full access
  Unlock Premium Member

Question 158

Report Export Collapse

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.

What countermeasures could he take to prevent DDoS attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 159

Report Export Collapse

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 160

Report Export Collapse

At what layer of the OSI model do routers function on?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions