ExamGecko
Home / ECCouncil / 312-49v10 / List of questions
Ask Question

ECCouncil 312-49v10 Practice Test - Questions Answers, Page 54

Add to Whishlist

List of questions

Question 531

Report Export Collapse

Which of the following is found within the unique instance ID key and helps investigators to map the entry from USBSTOR key to the MountedDevices key?

Become a Premium Member for full access
  Unlock Premium Member

Question 532

Report Export Collapse

What is the investigator trying to analyze if the system gives the following image as output?

ECCouncil 312-49v10 image Question 532 24558 09182024185500000000

Become a Premium Member for full access
  Unlock Premium Member

Question 533

Report Export Collapse

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

Become a Premium Member for full access
  Unlock Premium Member

Question 534

Report Export Collapse

> NMAP -sn 192.168.11.200-215 The NMAP command above performs which of the following?

Become a Premium Member for full access
  Unlock Premium Member

Question 535

Report Export Collapse

You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for. Which of the below scanning technique will you use?

Become a Premium Member for full access
  Unlock Premium Member

Question 536

Report Export Collapse

In both pharming and phishing attacks an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims. What is the difference between pharming and phishing attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 537

Report Export Collapse

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing . What document describes the specifics of the testing, the associated violations, and essentially protects both the organization's interest and your liabilities as a tester?

Become a Premium Member for full access
  Unlock Premium Member

Question 538

Report Export Collapse

A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees don't like changes.

You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as a display filter to find unencrypted file transfers?

Become a Premium Member for full access
  Unlock Premium Member

Question 539

Report Export Collapse

To reach a bank web site, the traffic from workstations must pass through a firewall. You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/24 can only reach the bank web site 10.20.20.1 using https. Which of the following firewall rules meets this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 540

Report Export Collapse

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware.

Become a Premium Member for full access
  Unlock Premium Member
Total 704 questions
Go to page: of 71
Search

Related questions