ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.

He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

A.
Disable unused ports in the switches
A.
Disable unused ports in the switches
Answers
B.
Separate students in a different VLAN
B.
Separate students in a different VLAN
Answers
C.
Use the 802.1x protocol
C.
Use the 802.1x protocol
Answers
D.
Ask students to use the wireless network
D.
Ask students to use the wireless network
Answers
Suggested answer: C

A company's policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes.

You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?

A.
tcp.port = = 21
A.
tcp.port = = 21
Answers
B.
tcp.port = 23
B.
tcp.port = 23
Answers
C.
tcp.port = = 21 | | tcp.port = =22
C.
tcp.port = = 21 | | tcp.port = =22
Answers
D.
tcp.port ! = 21
D.
tcp.port ! = 21
Answers
Suggested answer: A

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ""FTP on the network!"";)

A.
A firewall IPTable
A.
A firewall IPTable
Answers
B.
FTP Server rule
B.
FTP Server rule
Answers
C.
A Router IPTable
C.
A Router IPTable
Answers
D.
An Intrusion Detection System
D.
An Intrusion Detection System
Answers
Suggested answer: D

Which of the following program infects the system boot sector and the executable files at the same time?

A.
Polymorphic virus
A.
Polymorphic virus
Answers
B.
Stealth virus
B.
Stealth virus
Answers
C.
Multipartite Virus
C.
Multipartite Virus
Answers
D.
Macro virus
D.
Macro virus
Answers
Suggested answer: C

To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.

What term is commonly used when referring to this type of testing?

A.
Randomizing
A.
Randomizing
Answers
B.
Bounding
B.
Bounding
Answers
C.
Mutating
C.
Mutating
Answers
D.
Fuzzing
D.
Fuzzing
Answers
Suggested answer: D

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the network's external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?

A.
Protocol analyzer
A.
Protocol analyzer
Answers
B.
Network sniffer
B.
Network sniffer
Answers
C.
Intrusion Prevention System (IPS)
C.
Intrusion Prevention System (IPS)
Answers
D.
Vulnerability scanner
D.
Vulnerability scanner
Answers
Suggested answer: A

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE's Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.

What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

A.
Public
A.
Public
Answers
B.
Private
B.
Private
Answers
C.
Shared
C.
Shared
Answers
D.
Root
D.
Root
Answers
Suggested answer: B

Why should the security analyst disable/remove unnecessary ISAPI filters?

A.
To defend against social engineering attacks
A.
To defend against social engineering attacks
Answers
B.
To defend against webserver attacks
B.
To defend against webserver attacks
Answers
C.
To defend against jailbreaking
C.
To defend against jailbreaking
Answers
D.
To defend against wireless attacks
D.
To defend against wireless attacks
Answers
Suggested answer: B

Which of the following is a component of a risk assessment?

A.
Administrative safeguards
A.
Administrative safeguards
Answers
B.
Physical security
B.
Physical security
Answers
C.
DMZ
C.
DMZ
Answers
D.
Logical interface
D.
Logical interface
Answers
Suggested answer: A

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks like this:

From: [email protected]

To: [email protected] Subject: Test message

Date: 4/3/2017 14:37

The employee of CompanyXYZ receives your email message.

This proves that CompanyXYZ's email gateway doesn't prevent what?

A.
Email Masquerading
A.
Email Masquerading
Answers
B.
Email Harvesting
B.
Email Harvesting
Answers
C.
Email Phishing
C.
Email Phishing
Answers
D.
Email Spoofing
D.
Email Spoofing
Answers
Suggested answer: D

Explanation:

Email spoofing is the fabrication of an email header in the hopes of duping the recipient into thinking the email originated from someone or somewhere other than the intended source. Because core email protocols do not have a built-in method of authentication, it is common for spam and phishing emails to use said spoofing to trick the recipient into trusting the origin of the message.

The ultimate goal of email spoofing is to get recipients to open, and possibly even respond to, a solicitation. Although the spoofed messages are usually just a nuisance requiring little action besides removal, the more malicious varieties can cause significant problems and sometimes pose a real security threat.

Total 573 questions
Go to page: of 58