ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

Fingerprinting an Operating System helps a cracker because:

Become a Premium Member for full access
  Unlock Premium Member

Question 162

Report Export Collapse

In the context of Windows Security, what is a 'null' user?

Become a Premium Member for full access
  Unlock Premium Member

Question 163

Report Export Collapse

What does the following command in netcat do? nc -l -u -p55555 < /etc/passwd

Become a Premium Member for full access
  Unlock Premium Member

Question 164

Report Export Collapse

What hacking attack is challenge/response authentication used to prevent?

Become a Premium Member for full access
  Unlock Premium Member

Question 165

Report Export Collapse

In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. Ignorant users usually fall prey to this scam.

Which of the following statement is incorrect related to this attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse

Bob is going to perform an active session hijack against Brownies Inc. He has found a target that allows session oriented connections (Telnet) and performs the sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network. What is Bob supposed to do next?

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

ViruXine.W32 virus hides their presence by changing the underlying executable code.

This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all.

ECCouncil 312-50v12 image Question 167 24897 09182024185521000000

Here is a section of the Virus code:

ECCouncil 312-50v12 image Question 167 24897 09182024185521000000

What is this technique called?

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

ECCouncil 312-50v12 image Question 168 24898 09182024185521000000

Identify the correct terminology that defines the above statement.

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches.

If these switches' ARP cache is successfully flooded, what will be the result?

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c

ECCouncil 312-50v12 image Question 170 24900 09182024185521000000

What is the hexadecimal value of NOP instruction?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58

Related questions