ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

What will the following URL produce in an unpatched IIS Web Server? http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

Become a Premium Member for full access
  Unlock Premium Member

Question 172

Report Export Collapse

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

Become a Premium Member for full access
  Unlock Premium Member

Question 173

Report Export Collapse

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

Become a Premium Member for full access
  Unlock Premium Member

Question 174

Report Export Collapse

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

Become a Premium Member for full access
  Unlock Premium Member

Question 175

Report Export Collapse

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

Become a Premium Member for full access
  Unlock Premium Member

Question 176

Report Export Collapse

You are running through a series of tests on your network to check for any security vulnerabilities.

After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?

Become a Premium Member for full access
  Unlock Premium Member

Question 177

Report Export Collapse

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your

ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

Become a Premium Member for full access
  Unlock Premium Member

Question 178

Report Export Collapse

Software firewalls work at which layer of the OSI model?

Become a Premium Member for full access
  Unlock Premium Member

Question 179

Report Export Collapse

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

Become a Premium Member for full access
  Unlock Premium Member

Question 180

Report Export Collapse

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory.

He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions