ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 19

Add to Whishlist

List of questions

Question 181

Report Export Collapse

You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.

Dear valued customers, We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats.

Simply visit the link below and enter your antivirus code:

ECCouncil 312-50v12 image Question 181 24911 09182024185521000000

or you may contact us at the following address:

Media Internet Consultants, Edif. Neptuno, Planta

Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama

How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

Become a Premium Member for full access
  Unlock Premium Member

Question 182

Report Export Collapse

Every company needs a formal written document which spells out to employees precisely what they are allowed to use the company's systems for, what is prohibited, and what will happen to them if they break the rules. Two printed copies of the policy should be given to every employee as soon as possible after they join the organization. The employee should be asked to sign one copy, which should be safely filed by the company. No one should be allowed to use the company's computer systems until they have signed the policy in acceptance of its terms.

What is this document called?

Become a Premium Member for full access
  Unlock Premium Member

Question 183

Report Export Collapse

Take a look at the following attack on a Web Server using obstructed URL:

ECCouncil 312-50v12 image Question 183 24913 09182024185521000000

How would you protect from these attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 184

Report Export Collapse

Which type of sniffing technique is generally referred as MiTM attack?

ECCouncil 312-50v12 image Question 184 24914 09182024185521000000

Become a Premium Member for full access
  Unlock Premium Member

Question 185

Report Export Collapse

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

ECCouncil 312-50v12 image Question 185 24915 09182024185521000000

In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

Become a Premium Member for full access
  Unlock Premium Member

Question 186

Report Export Collapse

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.

Your peer, Peter Smith who works at the same department disagrees with you.

He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.

What is Peter Smith talking about?

Become a Premium Member for full access
  Unlock Premium Member

Question 187

Report Export Collapse

How does a denial-of-service attack work?

Become a Premium Member for full access
  Unlock Premium Member

Question 188

Report Export Collapse

You are trying to break into a highly classified top-secret mainframe computer with highest security system in place at Merclyn Barley Bank located in Los Angeles.

You know that conventional hacking doesn't work in this case, because organizations such as banks are generally tight and secure when it comes to protecting their systems.

In other words, you are trying to penetrate an otherwise impenetrable system.

How would you proceed?

Become a Premium Member for full access
  Unlock Premium Member

Question 189

Report Export Collapse

This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

ECCouncil 312-50v12 image Question 189 24919 09182024185521000000

What is this attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 190

Report Export Collapse

Which utility will tell you in real time which ports are listening or in another state?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions