ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 20

Question list
Search
Search

List of questions

Search

Related questions











During an Xmas scan what indicates a port is closed?

A.
No return response
A.
No return response
Answers
B.
RST
B.
RST
Answers
C.
ACK
C.
ACK
Answers
D.
SYN
D.
SYN
Answers
Suggested answer: B

Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp's lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104- 501. What needs to happen before

Matthew has full administrator access?

A.
He must perform privilege escalation.
A.
He must perform privilege escalation.
Answers
B.
He needs to disable antivirus protection.
B.
He needs to disable antivirus protection.
Answers
C.
He needs to gain physical access.
C.
He needs to gain physical access.
Answers
D.
He already has admin privileges, as shown by the "501" at the end of the SID.
D.
He already has admin privileges, as shown by the "501" at the end of the SID.
Answers
Suggested answer: A

An LDAP directory can be used to store information similar to a SQL database. LDAP uses a _____ database structure instead of SQL's _____ structure. Because of this, LDAP has difficulty representing many-to-one relationships.

A.
Relational, Hierarchical
A.
Relational, Hierarchical
Answers
B.
Strict, Abstract
B.
Strict, Abstract
Answers
C.
Hierarchical, Relational
C.
Hierarchical, Relational
Answers
D.
Simple, Complex
D.
Simple, Complex
Answers
Suggested answer: C

Elliot is in the process of exploiting a web application that uses SQL as a back-end database. He's determined that the application is vulnerable to SQL injection, and has introduced conditional timing delays into injected queries to determine whether they are successful. What type of SQL injection is Elliot most likely performing?

A.
Error-based SQL injection
A.
Error-based SQL injection
Answers
B.
Blind SQL injection
B.
Blind SQL injection
Answers
C.
Union-based SQL injection
C.
Union-based SQL injection
Answers
D.
NoSQL injection
D.
NoSQL injection
Answers
Suggested answer: B

John is an incident handler at a financial institution. His steps in a recent incident are not up to the standards of the company. John frequently forgets some steps and procedures while handling responses as they are very stressful to perform. Which of the following actions should John take to overcome this problem with the least administrative effort?

A.
Create an incident checklist.
A.
Create an incident checklist.
Answers
B.
Select someone else to check the procedures.
B.
Select someone else to check the procedures.
Answers
C.
Increase his technical skills.
C.
Increase his technical skills.
Answers
D.
Read the incident manual every time it occurs.
D.
Read the incident manual every time it occurs.
Answers
Suggested answer: C

You are performing a penetration test for a client and have gained shell access to a Windows machine on the internal network. You intend to retrieve all DNS records for the internal domain, if the DNS server is at 192.168.10.2 and the domain name is PLUScorp.local, what command would you type at the nslookup prompt to attempt a zone transfer?

A.
list server=192.168.10.2 type=all
A.
list server=192.168.10.2 type=all
Answers
B.
is-d PLUScorp.local
B.
is-d PLUScorp.local
Answers
C.
Iserver 192.168.10.2-t all
C.
Iserver 192.168.10.2-t all
Answers
D.
List domain=PLUScorp.local type=zone
D.
List domain=PLUScorp.local type=zone
Answers
Suggested answer: B

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

A.
openssl s_client -site www.website.com:443
A.
openssl s_client -site www.website.com:443
Answers
B.
openssl_client -site www.website.com:443
B.
openssl_client -site www.website.com:443
Answers
C.
openssl s_client -connect www.website.com:443
C.
openssl s_client -connect www.website.com:443
Answers
D.
openssl_client -connect www.website.com:443
D.
openssl_client -connect www.website.com:443
Answers
Suggested answer: C

What is the purpose of DNS AAAA record?

A.
Authorization, Authentication and Auditing record
A.
Authorization, Authentication and Auditing record
Answers
B.
Address prefix record
B.
Address prefix record
Answers
C.
Address database record
C.
Address database record
Answers
D.
IPv6 address resolution record
D.
IPv6 address resolution record
Answers
Suggested answer: D

Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He is looking for an IDS with the following characteristics: - Verifies success or failure of an attack - Monitors system activities Detects attacks that a network-based IDS fails to detect - Near real-time detection and response - Does not require additional hardware - Lower entry cost Which type of IDS is best suited for Tremp's requirements?

A.
Gateway-based IDS
A.
Gateway-based IDS
Answers
B.
Network-based IDS
B.
Network-based IDS
Answers
C.
Host-based IDS
C.
Host-based IDS
Answers
D.
Open source-based
D.
Open source-based
Answers
Suggested answer: C

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment-

A.
VCloud based
A.
VCloud based
Answers
B.
Honypot based
B.
Honypot based
Answers
C.
Behaviour based
C.
Behaviour based
Answers
D.
Heuristics based
D.
Heuristics based
Answers
Suggested answer: A
Total 573 questions
Go to page: of 58