ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address.

Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting.

Why did this ping sweep only produce a few responses?

A.
Only IBM AS/400 will reply to this scan
A.
Only IBM AS/400 will reply to this scan
Answers
B.
Only Windows systems will reply to this scan
B.
Only Windows systems will reply to this scan
Answers
C.
A switched network will not respond to packets sent to the broadcast address
C.
A switched network will not respond to packets sent to the broadcast address
Answers
D.
Only Unix and Unix-like systems will reply to this scan
D.
Only Unix and Unix-like systems will reply to this scan
Answers
Suggested answer: D

Explanation:

Topic 2, Exam Pool B

Explanation:

Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network?

A.
Block all internal MAC address from using SNMP
A.
Block all internal MAC address from using SNMP
Answers
B.
Block access to UDP port 171
B.
Block access to UDP port 171
Answers
C.
Block access to TCP port 171
C.
Block access to TCP port 171
Answers
D.
Change the default community string names
D.
Change the default community string names
Answers
Suggested answer: D

After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers.

This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

A.
RestrictAnonymous must be set to "10" for complete security
A.
RestrictAnonymous must be set to "10" for complete security
Answers
B.
RestrictAnonymous must be set to "3" for complete security
B.
RestrictAnonymous must be set to "3" for complete security
Answers
C.
RestrictAnonymous must be set to "2" for complete security
C.
RestrictAnonymous must be set to "2" for complete security
Answers
D.
There is no way to always prevent an anonymous null session from establishing
D.
There is no way to always prevent an anonymous null session from establishing
Answers
Suggested answer: C

In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

A.
The change in the routing fabric to bypass the affected router
A.
The change in the routing fabric to bypass the affected router
Answers
B.
More RESET packets to the affected router to get it to power back up
B.
More RESET packets to the affected router to get it to power back up
Answers
C.
RESTART packets to the affected router to get it to power back up
C.
RESTART packets to the affected router to get it to power back up
Answers
D.
STOP packets to all other routers warning of where the attack originated
D.
STOP packets to all other routers warning of where the attack originated
Answers
Suggested answer: A

How many possible sequence number combinations are there in TCP/IP protocol?

A.
1 billion
A.
1 billion
Answers
B.
320 billion
B.
320 billion
Answers
C.
4 billion
C.
4 billion
Answers
D.
32 million
D.
32 million
Answers
Suggested answer: C

Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast.

On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away.

Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?

A.
Computers on his wired network
A.
Computers on his wired network
Answers
B.
Satellite television
B.
Satellite television
Answers
C.
2.4Ghz Cordless phones
C.
2.4Ghz Cordless phones
Answers
D.
CB radio
D.
CB radio
Answers
Suggested answer: C

If a PDA is seized in an investigation while the device is turned on, what would be the proper procedure?

A.
Keep the device powered on
A.
Keep the device powered on
Answers
B.
Turn off the device immediately
B.
Turn off the device immediately
Answers
C.
Remove the battery immediately
C.
Remove the battery immediately
Answers
D.
Remove any memory cards immediately
D.
Remove any memory cards immediately
Answers
Suggested answer: A

What hashing method is used to password protect Blackberry devices?

A.
AES
A.
AES
Answers
B.
RC5
B.
RC5
Answers
C.
MD5
C.
MD5
Answers
D.
SHA-1
D.
SHA-1
Answers
Suggested answer: D

What layer of the OSI model do TCP and UDP utilize?

A.
Data Link
A.
Data Link
Answers
B.
Network
B.
Network
Answers
C.
Transport
C.
Transport
Answers
D.
Session
D.
Session
Answers
Suggested answer: C

When making the preliminary investigations in a sexual harassment case, how many investigators are you recommended having?

A.
One
A.
One
Answers
B.
Two
B.
Two
Answers
C.
Three
C.
Three
Answers
D.
Four
D.
Four
Answers
Suggested answer: B
Total 704 questions
Go to page: of 71