ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 18

Add to Whishlist

List of questions

Question 171

Report Export Collapse

This TCP flag instructs the sending system to transmit all buffered data immediately.

Become a Premium Member for full access
  Unlock Premium Member

Question 172

Report Export Collapse

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list as below:

You are hired to conduct security testing on their network.

You successfully brute-force the SNMP community string using a SNMP crack tool.

The access-list configured at the router prevents you from establishing a successful connection.

You want to retrieve the Cisco configuration from the router. How would you proceed?

Become a Premium Member for full access
  Unlock Premium Member

Question 173

Report Export Collapse

You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?

Become a Premium Member for full access
  Unlock Premium Member

Question 174

Report Export Collapse

Study the snort rule given below and interpret the rule. alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msG. "mountd access";)

Become a Premium Member for full access
  Unlock Premium Member

Question 175

Report Export Collapse

What port number is used by LDAP protocol?

Become a Premium Member for full access
  Unlock Premium Member

Question 176

Report Export Collapse

Fred is the network administrator for his company. Fred is testing an internal switch.

From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?

Become a Premium Member for full access
  Unlock Premium Member

Question 177

Report Export Collapse

Within the context of Computer Security, which of the following statements describes Social Engineering best?

Become a Premium Member for full access
  Unlock Premium Member

Question 178

Report Export Collapse

In Trojan terminology, what is a covert channel?

ECCouncil 312-50v12 image Question 178 24908 09182024185521000000

Become a Premium Member for full access
  Unlock Premium Member

Question 179

Report Export Collapse

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

How would an attacker exploit this design by launching TCP SYN attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 180

Report Export Collapse

Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.

What would Yancey be considered?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions