ECCouncil 312-50v12 Practice Test - Questions Answers, Page 21

List of questions
Question 201

Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions.
Which of the following tools is he most likely using?
Question 202

Which of the following statements is FALSE with respect to Intrusion Detection Systems?
Question 203

While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences.
He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using "-si" with Nmap?
Question 204

Which command can be used to show the current TCP/IP connections?
Question 205

You are analysing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs - 192.168.8.0/24. What command you would use?
Question 206

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to.
Question 207

You have successfully logged on a Linux system. You want to now cover your trade Your login attempt may be logged on several files located in /var/log. Which file does NOT belongs to the list:
Question 208

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?
Question 209

What is the main security service a cryptographic hash provides?
Question 210

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?
Question