ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 10

Question list
Search
Search

Related questions











What is the purpose of a demilitarized zone on a network?

A.
To scan all traffic coming through the DMZ to the internal network
A.
To scan all traffic coming through the DMZ to the internal network
Answers
B.
To only provide direct access to the nodes within the DMZ and protect the network behind it
B.
To only provide direct access to the nodes within the DMZ and protect the network behind it
Answers
C.
To provide a place to put the honeypot
C.
To provide a place to put the honeypot
Answers
D.
To contain the network devices you wish to protect
D.
To contain the network devices you wish to protect
Answers
Suggested answer: B

Which of the following Linux commands will resolve a domain name into IP address?

A.
>host-t a hackeddomain.com
A.
>host-t a hackeddomain.com
Answers
B.
>host-t ns hackeddomain.com
B.
>host-t ns hackeddomain.com
Answers
C.
>host -t soa hackeddomain.com
C.
>host -t soa hackeddomain.com
Answers
D.
>host -t AXFR hackeddomain.com
D.
>host -t AXFR hackeddomain.com
Answers
Suggested answer: A

Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?

A.
Linux
A.
Linux
Answers
B.
Unix
B.
Unix
Answers
C.
OS X
C.
OS X
Answers
D.
Windows
D.
Windows
Answers
Suggested answer: D

Which regulation defines security and privacy controls for Federal information systems and organizations?

A.
HIPAA
A.
HIPAA
Answers
B.
EU Safe Harbor
B.
EU Safe Harbor
Answers
C.
PCI-DSS
C.
PCI-DSS
Answers
D.
NIST-800-53
D.
NIST-800-53
Answers
Suggested answer: D

Explanation:

NIST Special Publication 800-53 provides a catalog of security and privacy controls for all U.S. federal information systems except those related to national security. It is published by the National Institute of Standards and Technology, which is a non-regulatory agency of the United States Department of Commerce. NIST develops and issues standards, guidelines, and other publications to assist federal agencies in implementing the Federal Information Security

Modernization Act of 2014 (FISMA) and to help with managing cost-effective programs to protect their information and information systems.

What is a "Collision attack" in cryptography?

A.
Collision attacks try to get the public key
A.
Collision attacks try to get the public key
Answers
B.
Collision attacks try to break the hash into three parts to get the plaintext value
B.
Collision attacks try to break the hash into three parts to get the plaintext value
Answers
C.
Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
C.
Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key
Answers
D.
Collision attacks try to find two inputs producing the same hash
D.
Collision attacks try to find two inputs producing the same hash
Answers
Suggested answer: D

Which of the following tools can be used for passive OS fingerprinting?

A.
nmap
A.
nmap
Answers
B.
tcpdump
B.
tcpdump
Answers
C.
tracert
C.
tracert
Answers
D.
ping
D.
ping
Answers
Suggested answer: B

Which of the following describes the characteristics of a Boot Sector Virus?

A.
Modifies directory table entries so that directory entries point to the virus code instead of the actual program.
A.
Modifies directory table entries so that directory entries point to the virus code instead of the actual program.
Answers
B.
Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.
B.
Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.
Answers
C.
Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.
C.
Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.
Answers
D.
Overwrites the original MBR and only executes the new virus code.
D.
Overwrites the original MBR and only executes the new virus code.
Answers
Suggested answer: C

Your company was hired by a small healthcare provider to perform a technical assessment on the network.

What is the best approach for discovering vulnerabilities on a Windows-based computer?

A.
Use the built-in Windows Update tool
A.
Use the built-in Windows Update tool
Answers
B.
Use a scan tool like Nessus
B.
Use a scan tool like Nessus
Answers
C.
Check MITRE.org for the latest list of CVE findings
C.
Check MITRE.org for the latest list of CVE findings
Answers
D.
Create a disk image of a clean Windows installation
D.
Create a disk image of a clean Windows installation
Answers
Suggested answer: B

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

A.
nessus
A.
nessus
Answers
B.
tcpdump
B.
tcpdump
Answers
C.
ethereal
C.
ethereal
Answers
D.
jack the ripper
D.
jack the ripper
Answers
Suggested answer: B

Explanation:

Tcpdump is a data-network packet analyzer computer program that runs under a command-line interface. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Distributed under the BSD license, tcpdump is free software.

https://www.wireshark.org/

Wireshark is a free and open-source packet analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.

NOTE: Wireshark is very similar to tcpdump, but has a graphical front-end, plus some integrated sorting and filtering options.

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?

A.
Spanning tree
A.
Spanning tree
Answers
B.
Dynamic ARP Inspection (DAI)
B.
Dynamic ARP Inspection (DAI)
Answers
C.
Port security
C.
Port security
Answers
D.
Layer 2 Attack Prevention Protocol (LAPP)
D.
Layer 2 Attack Prevention Protocol (LAPP)
Answers
Suggested answer: B

Explanation:

Dynamic ARP inspection (DAI) protects switching devices against Address Resolution Protocol (ARP) packet spoofing (also known as ARP poisoning or ARP cache poisoning).

DAI inspects ARPs on the LAN and uses the information in the DHCP snooping database on the switch to validate ARP packets and to protect against ARP spoofing. ARP requests and replies are compared against entries in the DHCP snooping database, and filtering decisions are made based on the results of those comparisons. When an attacker tries to use a forged ARP packet to spoof an address, the switch compares the address with entries in the database. If the media access control (MAC) address or IP address in the ARP packet does not match a valid entry in the DHCP snooping database, the packet is dropped.

Total 573 questions
Go to page: of 58