ExamGecko
Home Home / ECCouncil / 312-49v10

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 54

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is found within the unique instance ID key and helps investigators to map the entry from USBSTOR key to the MountedDevices key?

A.
ParentIDPrefix
A.
ParentIDPrefix
Answers
B.
LastWrite
B.
LastWrite
Answers
C.
UserAssist key
C.
UserAssist key
Answers
D.
MRUListEx key
D.
MRUListEx key
Answers
Suggested answer: A

What is the investigator trying to analyze if the system gives the following image as output?

A.
All the logon sessions
A.
All the logon sessions
Answers
B.
Currently active logon sessions
B.
Currently active logon sessions
Answers
C.
Inactive logon sessions
C.
Inactive logon sessions
Answers
D.
Details of users who can logon
D.
Details of users who can logon
Answers
Suggested answer: B

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

A.
All three servers need to be placed internally
A.
All three servers need to be placed internally
Answers
B.
A web server and the database server facing the Internet, an application server on the internal network
B.
A web server and the database server facing the Internet, an application server on the internal network
Answers
C.
A web server facing the Internet, an application server on the internal network, a database server on the internal network
C.
A web server facing the Internet, an application server on the internal network, a database server on the internal network
Answers
D.
All three servers need to face the Internet so that they can communicate between themselves
D.
All three servers need to face the Internet so that they can communicate between themselves
Answers
Suggested answer: D

> NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following?

A.
A trace sweep
A.
A trace sweep
Answers
B.
A port scan
B.
A port scan
Answers
C.
A ping scan
C.
A ping scan
Answers
D.
An operating system detect
D.
An operating system detect
Answers
Suggested answer: C

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?

A.
Inverse TCP flag scanning
A.
Inverse TCP flag scanning
Answers
B.
ACK flag scanning
B.
ACK flag scanning
Answers
C.
TCP Scanning
C.
TCP Scanning
Answers
D.
IP Fragment Scanning
D.
IP Fragment Scanning
Answers
Suggested answer: D

In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims. What is the difference between pharming and phishing attacks?

A.
Both pharming and phishing attacks are purely technical and are not considered forms of social engineering
A.
Both pharming and phishing attacks are purely technical and are not considered forms of social engineering
Answers
B.
In a pharming attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishing attack an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name
B.
In a pharming attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishing attack an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name
Answers
C.
In a phishing attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a pharming attack an attacker provides the victim with a URL that is either misspelled or looks very similar to the actual websites domain name
C.
In a phishing attack a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a pharming attack an attacker provides the victim with a URL that is either misspelled or looks very similar to the actual websites domain name
Answers
D.
Both pharming and phishing attacks are identical
D.
Both pharming and phishing attacks are identical
Answers
Suggested answer: B

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing . What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?

A.
Project Scope
A.
Project Scope
Answers
B.
Rules of Engagement
B.
Rules of Engagement
Answers
C.
Non-Disclosure Agreement
C.
Non-Disclosure Agreement
Answers
D.
Service Level Agreement
D.
Service Level Agreement
Answers
Suggested answer: B

A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees don't like changes.

You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?

A.
tcp.port = 23
A.
tcp.port = 23
Answers
B.
tcp.port == 21
B.
tcp.port == 21
Answers
C.
tcp.port == 21 || tcp.port == 22
C.
tcp.port == 21 || tcp.port == 22
Answers
D.
tcp.port != 21
D.
tcp.port != 21
Answers
Suggested answer: B

To reach a bank web site, the traffic from workstations must pass through a firewall. You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/24 can only reach the bank web site 10.20.20.1 using https. Which of the following firewall rules meets this requirement?

A.
if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 443) then permit
A.
if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 443) then permit
Answers
B.
if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 80 or 443) then permit
B.
if (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 80 or 443) then permit
Answers
C.
if (source matches 10.10.10.0 and destination matches 10.20.20.1 and port matches 443) then permit
C.
if (source matches 10.10.10.0 and destination matches 10.20.20.1 and port matches 443) then permit
Answers
Suggested answer: A

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware.

A.
Source code review
A.
Source code review
Answers
B.
Reviewing the firewalls configuration
B.
Reviewing the firewalls configuration
Answers
C.
Data items and vulnerability scanning
C.
Data items and vulnerability scanning
Answers
D.
Interviewing employees and network engineers
D.
Interviewing employees and network engineers
Answers
Suggested answer: A
Total 704 questions
Go to page: of 71