ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends

Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?

A.
Hillary network username and password hash
A.
Hillary network username and password hash
Answers
B.
The SID of Hillary network account
B.
The SID of Hillary network account
Answers
C.
The SAM file from Hillary computer
C.
The SAM file from Hillary computer
Answers
D.
The network shares that Hillary has permissions
D.
The network shares that Hillary has permissions
Answers
Suggested answer: A

Bill is the accounting manager for Grummon and Sons LLC in Chicago. On a regular basis, he needs to send PDF documents containing sensitive information through E-mail to his customers.

Bill protects the PDF documents with a password and sends them to their intended recipients.

Why PDF passwords do not offer maximum protection?

A.
PDF passwords can easily be cracked by software brute force tools
A.
PDF passwords can easily be cracked by software brute force tools
Answers
B.
PDF passwords are converted to clear text when sent through E-mail
B.
PDF passwords are converted to clear text when sent through E-mail
Answers
C.
PDF passwords are not considered safe by Sarbanes-Oxley
C.
PDF passwords are not considered safe by Sarbanes-Oxley
Answers
D.
When sent through E-mail, PDF passwords are stripped from the document completely
D.
When sent through E-mail, PDF passwords are stripped from the document completely
Answers
Suggested answer: A

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?

A.
EFS Encryption
A.
EFS Encryption
Answers
B.
DFS Encryption
B.
DFS Encryption
Answers
C.
IPS Encryption
C.
IPS Encryption
Answers
D.
SDW Encryption
D.
SDW Encryption
Answers
Suggested answer: A

Kimberly is studying to be an IT security analyst at a vocational school in her town. The school offers many different programming as well as networking languages. What networking protocol language should she learn that routers utilize?

A.
ATM
A.
ATM
Answers
B.
UDP
B.
UDP
Answers
C.
BPG
C.
BPG
Answers
D.
OSPF
D.
OSPF
Answers
Suggested answer: D

What is the target host IP in the following command?

A.
172.16.28.95
A.
172.16.28.95
Answers
B.
10.10.150.1
B.
10.10.150.1
Answers
C.
Firewalk does not scan target hosts
C.
Firewalk does not scan target hosts
Answers
D.
This command is using FIN packets, which cannot scan target hosts
D.
This command is using FIN packets, which cannot scan target hosts
Answers
Suggested answer: A

George is a senior security analyst working for a state agency in Florid a. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used.

What IDS feature must George implement to meet this requirement?

A.
Signature-based anomaly detection
A.
Signature-based anomaly detection
Answers
B.
Pattern matching
B.
Pattern matching
Answers
C.
Real-time anomaly detection
C.
Real-time anomaly detection
Answers
D.
Statistical-based anomaly detection
D.
Statistical-based anomaly detection
Answers
Suggested answer: C

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by

Firewalk. Why is that?

A.
Firewalk cannot pass through Cisco firewalls
A.
Firewalk cannot pass through Cisco firewalls
Answers
B.
Firewalk sets all packets with a TTL of zero
B.
Firewalk sets all packets with a TTL of zero
Answers
C.
Firewalk cannot be detected by network sniffers
C.
Firewalk cannot be detected by network sniffers
Answers
D.
Firewalk sets all packets with a TTL of one
D.
Firewalk sets all packets with a TTL of one
Answers
Suggested answer: D

After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks.

What countermeasures could he take to prevent DDoS attacks?

A.
Enable direct broadcasts
A.
Enable direct broadcasts
Answers
B.
Disable direct broadcasts
B.
Disable direct broadcasts
Answers
C.
Disable BGP
C.
Disable BGP
Answers
D.
Enable BGP
D.
Enable BGP
Answers
Suggested answer: B

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

A.
Nessus is too loud
A.
Nessus is too loud
Answers
B.
Nessus cannot perform wireless testing
B.
Nessus cannot perform wireless testing
Answers
C.
Nessus is not a network scanner
C.
Nessus is not a network scanner
Answers
D.
There are no ways of performing a "stealthy" wireless scan
D.
There are no ways of performing a "stealthy" wireless scan
Answers
Suggested answer: A

At what layer of the OSI model do routers function on?

A.
4
A.
4
Answers
B.
3
B.
3
Answers
C.
1
C.
1
Answers
D.
5
D.
5
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71