ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











You have compromised a lower-level administrator account on an Active Directory network of a small company in Dallas, Texas. You discover Domain Controllers through enumeration. You connect to one of the Domain Controllers on port 389 using ldp.exe. What are you trying to accomplish here?

A.
Poison the DNS records with false records
A.
Poison the DNS records with false records
Answers
B.
Enumerate MX and A records from DNS
B.
Enumerate MX and A records from DNS
Answers
C.
Establish a remote connection to the Domain Controller
C.
Establish a remote connection to the Domain Controller
Answers
D.
Enumerate domain user accounts and built-in groups
D.
Enumerate domain user accounts and built-in groups
Answers
Suggested answer: D

What are the security risks of running a "repair" installation for Windows XP?

A.
Pressing Shift+F10gives the user administrative rights
A.
Pressing Shift+F10gives the user administrative rights
Answers
B.
Pressing Shift+F1gives the user administrative rights
B.
Pressing Shift+F1gives the user administrative rights
Answers
C.
Pressing Ctrl+F10 gives the user administrative rights
C.
Pressing Ctrl+F10 gives the user administrative rights
Answers
D.
There are no security risks when running the "repair" installation for Windows XP
D.
There are no security risks when running the "repair" installation for Windows XP
Answers
Suggested answer: A

Terri works for a security consulting firm that is currently performing a penetration test on First National Bank in Tokyo. Terri's duties include bypassing firewalls and switches to gain access to the network. Terri sends an IP packet to one of the company's switches with ACK bit and the source address of her machine set. What is Terri trying to accomplish by sending this IP packet?

A.
Trick the switch into thinking it already has a session with Terri's computer
A.
Trick the switch into thinking it already has a session with Terri's computer
Answers
B.
Poison the switch's MAC address table by flooding it with ACK bits
B.
Poison the switch's MAC address table by flooding it with ACK bits
Answers
C.
Crash the switch with a DoS attack since switches cannot send ACK bits
C.
Crash the switch with a DoS attack since switches cannot send ACK bits
Answers
D.
Enable tunneling feature on the switch
D.
Enable tunneling feature on the switch
Answers
Suggested answer: A

You are a security analyst performing reconnaissance on a company you will be carrying out a penetration test for. You conduct a search for IT jobs on Dice.com and find the following information for an open position: 7+ years experience in Windows Server environment 5+ years experience in Exchange 2000/2003 environment Experience with Cisco Pix Firewall, Linksys 1376 router, Oracle 11i and MYOB v3.4 Accounting software are required MCSA desired, MCSE, CEH preferred No Unix/Linux Experience needed What is this information posted on the job website considered?

A.
Social engineering exploit
A.
Social engineering exploit
Answers
B.
Competitive exploit
B.
Competitive exploit
Answers
C.
Information vulnerability
C.
Information vulnerability
Answers
D.
Trade secret
D.
Trade secret
Answers
Suggested answer: C

The objective of this act was to protect consumers' personal financial information held by financial institutions and their service providers.

A.
Gramm-Leach-Bliley Act
A.
Gramm-Leach-Bliley Act
Answers
B.
Sarbanes-Oxley 2002
B.
Sarbanes-Oxley 2002
Answers
C.
California SB 1386
C.
California SB 1386
Answers
D.
HIPAA
D.
HIPAA
Answers
Suggested answer: A

Why is it a good idea to perform a penetration test from the inside?

A.
It is never a good idea to perform a penetration test from the inside
A.
It is never a good idea to perform a penetration test from the inside
Answers
B.
Because 70% of attacks are from inside the organization
B.
Because 70% of attacks are from inside the organization
Answers
C.
To attack a network from a hacker's perspective
C.
To attack a network from a hacker's perspective
Answers
D.
It is easier to hack from the inside
D.
It is easier to hack from the inside
Answers
Suggested answer: B

Harold is a web designer who has completed a website for ghttech.net. As part of the maintenance agreement he signed with the client, Harold is performing research online and seeing how much exposure the site has received so far.

Harold navigates to google.com and types in the following search. link:www.ghttech.net What will this search produce?

A.
All sites that ghttech.net links to
A.
All sites that ghttech.net links to
Answers
B.
All sites that link to ghttech.net
B.
All sites that link to ghttech.net
Answers
C.
All search engines that link to .net domains
C.
All search engines that link to .net domains
Answers
D.
Sites that contain the code: link:www.ghttech.net
D.
Sites that contain the code: link:www.ghttech.net
Answers
Suggested answer: B

Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

A.
Only an HTTPS session can be hijacked
A.
Only an HTTPS session can be hijacked
Answers
B.
HTTP protocol does not maintain session
B.
HTTP protocol does not maintain session
Answers
C.
Only FTP traffic can be hijacked
C.
Only FTP traffic can be hijacked
Answers
D.
Only DNS traffic can be hijacked
D.
Only DNS traffic can be hijacked
Answers
Suggested answer: B

A packet is sent to a router that does not have the packet destination address in its route table.

How will the packet get to its proper destination?

A.
Root Internet servers
A.
Root Internet servers
Answers
B.
Border Gateway Protocol
B.
Border Gateway Protocol
Answers
C.
Gateway of last resort
C.
Gateway of last resort
Answers
D.
Reverse DNS
D.
Reverse DNS
Answers
Suggested answer: C

James is testing the ability of his routers to withstand DoS attacks. James sends ICMP ECHO requests to the broadcast address of his network. What type of DoS attack is James testing against his network?

A.
Smurf
A.
Smurf
Answers
B.
Trinoo
B.
Trinoo
Answers
C.
Fraggle
C.
Fraggle
Answers
D.
SYN flood
D.
SYN flood
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71