ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.

Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.

In this context, what can you say?

A.
Bob can be right since DMZ does not make sense when combined with stateless firewalls
A.
Bob can be right since DMZ does not make sense when combined with stateless firewalls
Answers
B.
Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one
B.
Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one
Answers
C.
Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
C.
Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations
Answers
D.
Bob is partially right. DMZ does not make sense when a stateless firewall is available
D.
Bob is partially right. DMZ does not make sense when a stateless firewall is available
Answers
Suggested answer: C

Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites.

Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.

In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals? (Choose the test answer.)

A.
Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.
A.
Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.
Answers
B.
Hire more computer security monitoring personnel to monitor computer systems and networks.
B.
Hire more computer security monitoring personnel to monitor computer systems and networks.
Answers
C.
Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.
C.
Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.
Answers
D.
Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.
D.
Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.
Answers
Suggested answer: A

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor".

Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges.

A.
John
A.
John
Answers
B.
Rebecca
B.
Rebecca
Answers
C.
Sheela
C.
Sheela
Answers
D.
Shawn
D.
Shawn
Answers
E.
Somia
E.
Somia
Answers
F.
Chang
F.
Chang
Answers
G.
Micah
G.
Micah
Answers
Suggested answer: F

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

A.
Overloading Port Address Translation
A.
Overloading Port Address Translation
Answers
B.
Dynamic Port Address Translation
B.
Dynamic Port Address Translation
Answers
C.
Dynamic Network Address Translation
C.
Dynamic Network Address Translation
Answers
D.
Static Network Address Translation
D.
Static Network Address Translation
Answers
Suggested answer: D

What is the following command used for? net use \targetipc$ "" /u:""

A.
Grabbing the etc/passwd file
A.
Grabbing the etc/passwd file
Answers
B.
Grabbing the SAM
B.
Grabbing the SAM
Answers
C.
Connecting to a Linux computer through Samba.
C.
Connecting to a Linux computer through Samba.
Answers
D.
This command is used to connect as a null session
D.
This command is used to connect as a null session
Answers
E.
Enumeration of Cisco routers
E.
Enumeration of Cisco routers
Answers
Suggested answer: D

What is the proper response for a NULL scan if the port is closed?

A.
SYN
A.
SYN
Answers
B.
ACK
B.
ACK
Answers
C.
FIN
C.
FIN
Answers
D.
PSH
D.
PSH
Answers
E.
RST
E.
RST
Answers
F.
No response
F.
No response
Answers
Suggested answer: E

One of your team members has asked you to analyze the following SOA record.

What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)

A.
200303028
A.
200303028
Answers
B.
3600
B.
3600
Answers
C.
604800
C.
604800
Answers
D.
2400
D.
2400
Answers
E.
60
E.
60
Answers
F.
4800
F.
4800
Answers
Suggested answer: D

One of your team members has asked you to analyze the following SOA record. What is the version?

Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)

A.
200303028
A.
200303028
Answers
B.
3600
B.
3600
Answers
C.
604800
C.
604800
Answers
D.
2400
D.
2400
Answers
E.
60
E.
60
Answers
F.
4800
F.
4800
Answers
Suggested answer: A

MX record priority increases as the number increases. (True/False.)

A.
True
A.
True
Answers
B.
False
B.
False
Answers
Suggested answer: B

Which of the following tools can be used to perform a zone transfer?

A.
NSLookup
A.
NSLookup
Answers
B.
Finger
B.
Finger
Answers
C.
Dig
C.
Dig
Answers
D.
Sam Spade
D.
Sam Spade
Answers
E.
Host
E.
Host
Answers
F.
Netcat
F.
Netcat
Answers
G.
Neotrace
G.
Neotrace
Answers
Suggested answer: A, C, D, E
Total 573 questions
Go to page: of 58