ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











What will the following URL produce in an unpatched IIS Web Server? http://www.thetargetsite.com/scripts/..% co%af../..%co%af../windows/system32/cmd.exe?/c+dir+c:\

A.
Directory listing of C: drive on the web server
A.
Directory listing of C: drive on the web server
Answers
B.
Insert a Trojan horse into the C: drive of the web server
B.
Insert a Trojan horse into the C: drive of the web server
Answers
C.
Execute a buffer flow in the C: drive of the web server
C.
Execute a buffer flow in the C: drive of the web server
Answers
D.
Directory listing of the C:\windows\system32 folder on the web server
D.
Directory listing of the C:\windows\system32 folder on the web server
Answers
Suggested answer: A

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

A.
Cached password hashes for the past 20 users
A.
Cached password hashes for the past 20 users
Answers
B.
Service account passwords in plain text
B.
Service account passwords in plain text
Answers
C.
IAS account names and passwords
C.
IAS account names and passwords
Answers
D.
Local store PKI Kerberos certificates
D.
Local store PKI Kerberos certificates
Answers
Suggested answer: B

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

A.
%systemroot%\system32\LSA
A.
%systemroot%\system32\LSA
Answers
B.
%systemroot%\system32\drivers\etc
B.
%systemroot%\system32\drivers\etc
Answers
C.
%systemroot%\repair
C.
%systemroot%\repair
Answers
D.
%systemroot%\LSA
D.
%systemroot%\LSA
Answers
Suggested answer: C

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

A.
allinurl:"exchange/logon.asp"
A.
allinurl:"exchange/logon.asp"
Answers
B.
intitle:"exchange server"
B.
intitle:"exchange server"
Answers
C.
locate:"logon page"
C.
locate:"logon page"
Answers
D.
outlook:"search"
D.
outlook:"search"
Answers
Suggested answer: A

When setting up a wireless network with multiple access points, why is it important to set each access point on a different channel?

A.
Multiple access points can be set up on the same channel without any issues
A.
Multiple access points can be set up on the same channel without any issues
Answers
B.
Avoid over-saturation of wireless signals
B.
Avoid over-saturation of wireless signals
Answers
C.
So that the access points will work on different frequencies
C.
So that the access points will work on different frequencies
Answers
D.
Avoid cross talk
D.
Avoid cross talk
Answers
Suggested answer: D

You are running through a series of tests on your network to check for any security vulnerabilities.

After normal working hours, you initiate a DoS attack against your external firewall. The firewall Quickly freezes up and becomes unusable. You then initiate an FTP connection from an external IP into your internal network. The connection is successful even though you have FTP blocked at the external firewall. What has happened?

A.
The firewall failed-bypass
A.
The firewall failed-bypass
Answers
B.
The firewall failed-closed
B.
The firewall failed-closed
Answers
C.
The firewall ACL has been purged
C.
The firewall ACL has been purged
Answers
D.
The firewall failed-open
D.
The firewall failed-open
Answers
Suggested answer: D

You just passed your ECSA exam and are about to start your first consulting job running security audits for a financial institution in Los Angeles. The IT manager of the company you will be working for tries to see if you remember your

ECSA class. He asks about the methodology you will be using to test the company's network. How would you answer?

A.
Microsoft Methodology
A.
Microsoft Methodology
Answers
B.
Google Methodology
B.
Google Methodology
Answers
C.
IBM Methodology
C.
IBM Methodology
Answers
D.
LPT Methodology
D.
LPT Methodology
Answers
Suggested answer: D

Software firewalls work at which layer of the OSI model?

A.
Application
A.
Application
Answers
B.
Network
B.
Network
Answers
C.
Transport
C.
Transport
Answers
D.
Data Link
D.
Data Link
Answers
Suggested answer: D

After passing her CEH exam, Carol wants to ensure that her network is completely secure. She implements a DMZ, stateful firewall, NAT, IPSEC, and a packet filtering firewall. Since all security measures were taken, none of the hosts on her network can reach the Internet. Why is that?

A.
Stateful firewalls do not work with packet filtering firewalls
A.
Stateful firewalls do not work with packet filtering firewalls
Answers
B.
NAT does not work with stateful firewalls
B.
NAT does not work with stateful firewalls
Answers
C.
IPSEC does not work with packet filtering firewalls
C.
IPSEC does not work with packet filtering firewalls
Answers
D.
NAT does not work with IPSEC
D.
NAT does not work with IPSEC
Answers
Suggested answer: D

Jason has set up a honeypot environment by creating a DMZ that has no physical or logical access to his production network. In this honeypot, he has placed a server running Windows Active Directory.

He has also placed a Web server in the DMZ that services a number of web pages that offer visitors a chance to download sensitive information by clicking on a button. A week later, Jason finds in his network logs how an intruder accessed the honeypot and downloaded sensitive information. Jason uses the logs to try and prosecute the intruder for stealing sensitive corporate information. Why will this not be viable?

A.
Entrapment
A.
Entrapment
Answers
B.
Enticement
B.
Enticement
Answers
C.
Intruding into a honeypot is not illegal
C.
Intruding into a honeypot is not illegal
Answers
D.
Intruding into a DMZ is not illegal
D.
Intruding into a DMZ is not illegal
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71