ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

Related questions











Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should

Frank submit the log to find out if it is a new vulnerability or not?

A.
APIPA
A.
APIPA
Answers
B.
IANA
B.
IANA
Answers
C.
CVE
C.
CVE
Answers
D.
RIPE
D.
RIPE
Answers
Suggested answer: C

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department.

Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.

What filter should George use in Ethereal?

A.
src port 23 and dst port 23
A.
src port 23 and dst port 23
Answers
B.
udp port 22 and host 172.16.28.1/24
B.
udp port 22 and host 172.16.28.1/24
Answers
C.
net port 22
C.
net port 22
Answers
D.
src port 22 and dst port 22
D.
src port 22 and dst port 22
Answers
Suggested answer: D

Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security.

Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

A.
Border Gateway Protocol
A.
Border Gateway Protocol
Answers
B.
Cisco Discovery Protocol
B.
Cisco Discovery Protocol
Answers
C.
Broadcast System Protocol
C.
Broadcast System Protocol
Answers
D.
Simple Network Management Protocol
D.
Simple Network Management Protocol
Answers
Suggested answer: B

In Linux, what is the smallest possible shellcode?

A.
24 bytes
A.
24 bytes
Answers
B.
8 bytes
B.
8 bytes
Answers
C.
800 bytes
C.
800 bytes
Answers
D.
80 bytes
D.
80 bytes
Answers
Suggested answer: A

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test.

The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

A.
False negatives
A.
False negatives
Answers
B.
False positives
B.
False positives
Answers
C.
True negatives
C.
True negatives
Answers
D.
True positives
D.
True positives
Answers
Suggested answer: A

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of Californi a. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a

DoS attack on a system you are testing?

A.
Show outdated equipment so it can be replaced
A.
Show outdated equipment so it can be replaced
Answers
B.
List weak points on their network
B.
List weak points on their network
Answers
C.
Use attack as a launching point to penetrate deeper into the network
C.
Use attack as a launching point to penetrate deeper into the network
Answers
D.
Demonstrate that no system can be protected against DoS attacks
D.
Demonstrate that no system can be protected against DoS attacks
Answers
Suggested answer: B

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

A.
Linux/Unix computers are easier to compromise
A.
Linux/Unix computers are easier to compromise
Answers
B.
Linux/Unix computers are constantly talking
B.
Linux/Unix computers are constantly talking
Answers
C.
Windows computers are constantly talking
C.
Windows computers are constantly talking
Answers
D.
Windows computers will not respond to idle scans
D.
Windows computers will not respond to idle scans
Answers
Suggested answer: C

What operating system would respond to the following command?

A.
Windows 95
A.
Windows 95
Answers
B.
FreeBSD
B.
FreeBSD
Answers
C.
Windows XP
C.
Windows XP
Answers
D.
Mac OS X
D.
Mac OS X
Answers
Suggested answer: B

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

A.
Tailgating
A.
Tailgating
Answers
B.
Backtrapping
B.
Backtrapping
Answers
C.
Man trap attack
C.
Man trap attack
Answers
D.
Fuzzing
D.
Fuzzing
Answers
Suggested answer: A

On Linux/Unix based Web servers, what privilege should the daemon service be run under?

A.
Guest
A.
Guest
Answers
B.
Root
B.
Root
Answers
C.
You cannot determine what privilege runs the daemon service
C.
You cannot determine what privilege runs the daemon service
Answers
D.
Something other than root
D.
Something other than root
Answers
Suggested answer: D
Total 704 questions
Go to page: of 71