ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











This TCP flag instructs the sending system to transmit all buffered data immediately.

A.
SYN
A.
SYN
Answers
B.
RST
B.
RST
Answers
C.
PSH
C.
PSH
Answers
D.
URG
D.
URG
Answers
E.
FIN
E.
FIN
Answers
Suggested answer: C

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list as below:

You are hired to conduct security testing on their network.

You successfully brute-force the SNMP community string using a SNMP crack tool.

The access-list configured at the router prevents you from establishing a successful connection.

You want to retrieve the Cisco configuration from the router. How would you proceed?

A.
Use the Cisco's TFTP default password to connect and download the configuration file
A.
Use the Cisco's TFTP default password to connect and download the configuration file
Answers
B.
Run a network sniffer and capture the returned traffic with the configuration file from the router
B.
Run a network sniffer and capture the returned traffic with the configuration file from the router
Answers
C.
Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address
C.
Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address
Answers
D.
Send a customized SNMP set request with a spoofed source IP address in the range -192.168.1.0
D.
Send a customized SNMP set request with a spoofed source IP address in the range -192.168.1.0
Answers
Suggested answer: B, D

You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion?

A.
Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account
A.
Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account
Answers
B.
Package the Sales.xls using Trojan wrappers and telnet them back your home computer
B.
Package the Sales.xls using Trojan wrappers and telnet them back your home computer
Answers
C.
You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques
C.
You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques
Answers
D.
Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account
D.
Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account
Answers
Suggested answer: C

Study the snort rule given below and interpret the rule. alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msG. "mountd access";)

A.
An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111
A.
An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111
Answers
B.
An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet
B.
An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet
Answers
C.
An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet
C.
An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet
Answers
D.
An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111
D.
An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111
Answers
Suggested answer: D

What port number is used by LDAP protocol?

A.
110
A.
110
Answers
B.
389
B.
389
Answers
C.
464
C.
464
Answers
D.
445
D.
445
Answers
Suggested answer: B

Fred is the network administrator for his company. Fred is testing an internal switch.

From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?

A.
Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.
A.
Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.
Answers
B.
He can send an IP packet with the SYN bit and the source address of his computer.
B.
He can send an IP packet with the SYN bit and the source address of his computer.
Answers
C.
Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.
C.
Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.
Answers
D.
Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.
D.
Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.
Answers
Suggested answer: D

Within the context of Computer Security, which of the following statements describes Social Engineering best?

A.
Social Engineering is the act of publicly disclosing information
A.
Social Engineering is the act of publicly disclosing information
Answers
B.
Social Engineering is the means put in place by human resource to perform time accounting
B.
Social Engineering is the means put in place by human resource to perform time accounting
Answers
C.
Social Engineering is the act of getting needed information from a person rather than breaking into a system
C.
Social Engineering is the act of getting needed information from a person rather than breaking into a system
Answers
D.
Social Engineering is a training program within sociology studies
D.
Social Engineering is a training program within sociology studies
Answers
Suggested answer: C

In Trojan terminology, what is a covert channel?

A.
A channel that transfers information within a computer system or network in a way that violates the security policy
A.
A channel that transfers information within a computer system or network in a way that violates the security policy
Answers
B.
A legitimate communication path within a computer system or network for transfer of data
B.
A legitimate communication path within a computer system or network for transfer of data
Answers
C.
It is a kernel operation that hides boot processes and services to mask detection
C.
It is a kernel operation that hides boot processes and services to mask detection
Answers
D.
It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establishconnections
D.
It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establishconnections
Answers
Suggested answer: A

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

How would an attacker exploit this design by launching TCP SYN attack?

A.
Attacker generates TCP SYN packets with random destination addresses towards a victim host
A.
Attacker generates TCP SYN packets with random destination addresses towards a victim host
Answers
B.
Attacker floods TCP SYN packets with random source addresses towards a victim host
B.
Attacker floods TCP SYN packets with random source addresses towards a victim host
Answers
C.
Attacker generates TCP ACK packets with random source addresses towards a victim host
C.
Attacker generates TCP ACK packets with random source addresses towards a victim host
Answers
D.
Attacker generates TCP RST packets with random source addresses towards a victim host
D.
Attacker generates TCP RST packets with random source addresses towards a victim host
Answers
Suggested answer: B

Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.

What would Yancey be considered?

A.
Yancey would be considered a Suicide Hacker
A.
Yancey would be considered a Suicide Hacker
Answers
B.
Since he does not care about going to jail, he would be considered a Black Hat
B.
Since he does not care about going to jail, he would be considered a Black Hat
Answers
C.
Because Yancey works for the company currently; he would be a White Hat
C.
Because Yancey works for the company currently; he would be a White Hat
Answers
D.
Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing
D.
Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing
Answers
Suggested answer: A
Total 573 questions
Go to page: of 58