ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

A.
Copy the system files from a known good system
A.
Copy the system files from a known good system
Answers
B.
Perform a trap and trace
B.
Perform a trap and trace
Answers
C.
Delete the files and try to determine the source
C.
Delete the files and try to determine the source
Answers
D.
Reload from a previous backup
D.
Reload from a previous backup
Answers
E.
Reload from known good media
E.
Reload from known good media
Answers
Suggested answer: E

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?

A.
Application
A.
Application
Answers
B.
Transport
B.
Transport
Answers
C.
Session
C.
Session
Answers
D.
Presentation
D.
Presentation
Answers
Suggested answer: D

Explanation:

https://en.wikipedia.org/wiki/Presentation_layer In the seven-layer OSI model of computer networking, the presentation layer is layer 6 and serves as the data translator for the network. It is sometimes called the syntax layer. The presentation layer is responsible for the formatting and delivery of information to the application layer for further processing or display.

Encryption is typically done at this level too, although it can be done on the application, session, transport, or network layers, each having its own advantages and disadvantages. Decryption is also handled at the presentation layer. For example, when logging on to bank account sites the presentation layer will decrypt the data as it is received.

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client. What is a possible source of this problem?

A.
The WAP does not recognize the client's MAC address
A.
The WAP does not recognize the client's MAC address
Answers
B.
The client cannot see the SSID of the wireless network
B.
The client cannot see the SSID of the wireless network
Answers
C.
Client is configured for the wrong channel
C.
Client is configured for the wrong channel
Answers
D.
The wireless client is not configured to use DHCP
D.
The wireless client is not configured to use DHCP
Answers
Suggested answer: A

Explanation:

https://en.wikipedia.org/wiki/MAC_filtering MAC filtering is a security method based on access control. Each address is assigned a 48-bit address, which is used to determine whether we can access a network or not. It helps in listing a set of allowed devices that you need on your Wi-Fi and the list of denied devices that you don't want on your Wi-Fi. It helps in preventing unwanted access to the network. In a way, we can blacklist or white list certain computers based on their MAC address. We can configure the filter to allow connection only to those devices included in the white list. White lists provide greater security than blacklists because the router grants access only to selected devices.

It is used on enterprise wireless networks having multiple access points to prevent clients from communicating with each other. The access point can be configured only to allow clients to talk to the default gateway, but not other wireless clients. It increases the efficiency of access to a network.

The router allows configuring a list of allowed MAC addresses in its web interface, allowing you to choose which devices can connect to your network. The router has several functions designed to improve the network's security, but not all are useful. Media access control may seem advantageous, but there are certain flaws.

On a wireless network, the device with the proper credentials such as SSID and password can authenticate with the router and join the network, which gets an IP address and access to the internet and any shared resources.

MAC address filtering adds an extra layer of security that checks the device's MAC address against a list of agreed addresses. If the client's address matches one on the router's list, access is granted; otherwise, it doesn't join the network.

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist's email, and you send her an email changing the source email to her boss's email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don't work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

A.
Social engineering
A.
Social engineering
Answers
B.
Piggybacking
B.
Piggybacking
Answers
C.
Tailgating
C.
Tailgating
Answers
D.
Eavesdropping
D.
Eavesdropping
Answers
Suggested answer: A

Explanation:

Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data.

Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file.

Because social engineering involves a human element, preventing these attacks can be tricky for enterprises.

Incorrect answers:

Tailgating and Piggybacking are the same thing Tailgating, sometimes referred to as piggybacking, is a physical security breach in which an unauthorized person follows an authorized individual to enter a secured premise.

Tailgating provides a simple social engineering-based way around many security mechanisms one would think of as secure. Even retina scanners don't help if an employee holds the door for an unknown person behind them out of misguided courtesy.

People who might tailgate include disgruntled former employees, thieves, vandals, mischief-makers, and issues with employees or the company. Any of these can disrupt business, cause damage, create unexpected costs, and lead to further safety issues.

Eavesdropping https://en.wikipedia.org/wiki/Eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Since the beginning of the digital age, the term has also come to hold great significance in the world of cybersecurity.

The question does not specify at what level and how this attack is used. An attacker can eavesdrop on a conversation or use special software and obtain information on the network. There are many options, but this is not important because the correct answer is clearly not related to information interception.

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

A.
Traceroute
A.
Traceroute
Answers
B.
Hping
B.
Hping
Answers
C.
TCP ping
C.
TCP ping
Answers
D.
Broadcast ping
D.
Broadcast ping
Answers
Suggested answer: B

Explanation:

https://tools.kali.org/information-gathering/hping3

http://www.carnal0wnage.com/papers/LSO-Hping2-Basics.pdf

Which is the first step followed by Vulnerability Scanners for scanning a network?

A.
OS Detection
A.
OS Detection
Answers
B.
Firewall detection
B.
Firewall detection
Answers
C.
TCP/UDP Port scanning
C.
TCP/UDP Port scanning
Answers
D.
Checking if the remote host is alive
D.
Checking if the remote host is alive
Answers
Suggested answer: D

Explanation:

Vulnerability scanning solutions perform vulnerability penetration tests on the organizational network in three steps:

1. Locating nodes: The first step in vulnerability scanning is to locate live hosts in the target network using various scanning techniques.

2. Performing service and OS discovery on them: After detecting the live hosts in the target network, the next step is to enumerate the open ports and services and the operating system on the target systems.

3. Testing those services and OS for known vulnerabilities: Finally, after identifying the open services and the operating system running on the target nodes, they are tested for known vulnerabilities.

Which of the following programs is usually targeted at Microsoft Office products?

A.
Polymorphic virus
A.
Polymorphic virus
Answers
B.
Multipart virus
B.
Multipart virus
Answers
C.
Macro virus
C.
Macro virus
Answers
D.
Stealth virus
D.
Stealth virus
Answers
Suggested answer: C

Explanation:

A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). Some applications, such as Microsoft Office, allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread. (Wikipedia) NB: The virus Melissa is a well-known macro virus we could find attached to word documents.

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

A.
The computer is not using a private IP address.
A.
The computer is not using a private IP address.
Answers
B.
The gateway is not routing to a public IP address.
B.
The gateway is not routing to a public IP address.
Answers
C.
The gateway and the computer are not on the same network.
C.
The gateway and the computer are not on the same network.
Answers
D.
The computer is using an invalid IP address.
D.
The computer is using an invalid IP address.
Answers
Suggested answer: B

Explanation:

https://en.wikipedia.org/wiki/Private_network

In IP networking, a private network is a computer network that uses private IP address space. Both the IPv4 and the IPv6 specifications define private IP address ranges. These addresses are commonly used for local area networks (LANs) in residential, office, and enterprise environments.

Private network addresses are not allocated to any specific organization. Anyone may use these addresses without approval from regional or local Internet registries. Private IP address spaces were originally defined to assist in delaying

IPv4 address exhaustion. IP packets originating from or addressed to a private IP address cannot be routed through the public Internet.

The Internet Engineering Task Force (IETF) has directed the Internet Assigned Numbers Authority (IANA) to reserve the following IPv4 address ranges for private networks:

. 10.0.0.0 – 10.255.255.255

. 172.16.0.0 – 172.31.255.255

. 192.168.0.0 – 192.168.255.255

Backbone routers do not allow packets from or to internal IP addresses. That is, intranet machines, if no measures are taken, are isolated from the Internet. However, several technologies allow such machines to connect to the Internet.

. Mediation servers like IRC, Usenet, SMTP and Proxy server

. Network address translation (NAT)

. Tunneling protocol

NOTE: So, the problem is just one of these technologies.

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

A.
113
A.
113
Answers
B.
69
B.
69
Answers
C.
123
C.
123
Answers
D.
161
D.
161
Answers
Suggested answer: C

Explanation:

https://en.wikipedia.org/wiki/Network_Time_Protocol

The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

NTP is intended to synchronize all participating computers within a few milliseconds of Coordinated Universal Time (UTC). It uses the intersection algorithm, a modified version of Marzullo's algorithm, to select accurate time servers and is designed to mitigate variable network latency effects. NTP can usually maintain time to within tens of milliseconds over the public Internet and achieve better than one millisecond accuracy in local area networks. Asymmetric routes and network congestion can cause errors of 100 ms or more.

The protocol is usually described in terms of a client-server model but can easily be used in peer-topeer relationships where both peers consider the other to be a potential time source.

Implementations send and receive timestamps using the User Datagram Protocol (UDP) on port number 123.

Incorrect answers: https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers19 - Character Generator Protocol (CHARGEN)177 - X Display Manager Control Protocol (XDMCP)161 - Simple Network Management Protocol (SNMP)

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

A.
Nikto
A.
Nikto
Answers
B.
John the Ripper
B.
John the Ripper
Answers
C.
Dsniff
C.
Dsniff
Answers
D.
Snort
D.
Snort
Answers
Suggested answer: A

Explanation:

https://en.wikipedia.org/wiki/Nikto_(vulnerability_scanner)

Nikto is a free software command-line vulnerability scanner that scans web servers for dangerous files/CGIs, outdated server software, and other problems. It performs generic and server types specific checks. It also captures and prints any cookies received. The Nikto code itself is free software, but the data files it uses to drive the program are not.

Total 573 questions
Go to page: of 58