ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions.

Which of the following tools is he most likely using?

A.
Nikto
A.
Nikto
Answers
B.
Nmap
B.
Nmap
Answers
C.
Metasploit
C.
Metasploit
Answers
D.
Armitage
D.
Armitage
Answers
Suggested answer: B

Which of the following statements is FALSE with respect to Intrusion Detection Systems?

A.
Intrusion Detection Systems can be configured to distinguish specific content in network packets
A.
Intrusion Detection Systems can be configured to distinguish specific content in network packets
Answers
B.
Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic
B.
Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic
Answers
C.
Intrusion Detection Systems require constant update of the signature library
C.
Intrusion Detection Systems require constant update of the signature library
Answers
D.
Intrusion Detection Systems can examine the contents of the data n context of the network protocol
D.
Intrusion Detection Systems can examine the contents of the data n context of the network protocol
Answers
Suggested answer: B

While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences.

He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using "-si" with Nmap?

A.
Conduct stealth scan
A.
Conduct stealth scan
Answers
B.
Conduct ICMP scan
B.
Conduct ICMP scan
Answers
C.
Conduct IDLE scan
C.
Conduct IDLE scan
Answers
D.
Conduct silent scan
D.
Conduct silent scan
Answers
Suggested answer: C

Explanation:

Once a suitable zombie has been found, performing a scan is easy. Simply specify the zombie hostname to the -sI option and Nmap does the rest. Example 5.19 shows an example of Ereet scanning the Recording Industry Association of

America by bouncing an idle scan off an Adobe machine named Kiosk.

Example 5.19. An idle scan against the RIAA

# nmap -Pn -p- -sI kiosk.adobe.com www.riaa.com

Starting Nmap ( http://nmap.org )

Idlescan using zombie kiosk.adobe.com (192.150.13.111:80); Class: Incremental

Nmap scan report for 208.225.90.120

(The 65522 ports scanned but not shown below are in state: closed)

Port State Service

21/tcp open ftp

25/tcp open smtp

80/tcp open http

111/tcp open sunrpc

135/tcp open loc-srv

443/tcp open https

1027/tcp open IIS

1030/tcp open iad1

2306/tcp open unknown

5631/tcp open pcanywheredata

7937/tcp open unknown

7938/tcp open unknown

36890/tcp open unknown

Nmap done: 1 IP address (1 host up) scanned in 2594.47 seconds

https://nmap.org/book/idlescan.html

Which command can be used to show the current TCP/IP connections?

A.
Netsh
A.
Netsh
Answers
B.
Netstat
B.
Netstat
Answers
C.
Net use connection
C.
Net use connection
Answers
D.
Net use
D.
Net use
Answers
Suggested answer: A

You are analysing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs - 192.168.8.0/24. What command you would use?

A.
wireshark --fetch ''192.168.8*''
A.
wireshark --fetch ''192.168.8*''
Answers
B.
wireshark --capture --local masked 192.168.8.0 ---range 24
B.
wireshark --capture --local masked 192.168.8.0 ---range 24
Answers
C.
tshark -net 192.255.255.255 mask 192.168.8.0
C.
tshark -net 192.255.255.255 mask 192.168.8.0
Answers
D.
sudo tshark -f''net 192 .68.8.0/24''
D.
sudo tshark -f''net 192 .68.8.0/24''
Answers
Suggested answer: D

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to.

A.
4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?
A.
4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?
Answers
B.
210.1.55.200
B.
210.1.55.200
Answers
C.
10.1.4.254
C.
10.1.4.254
Answers
D.
10..1.5.200
D.
10..1.5.200
Answers
E.
10.1.4.156
E.
10.1.4.156
Answers
Suggested answer: C

You have successfully logged on a Linux system. You want to now cover your trade Your login attempt may be logged on several files located in /var/log. Which file does NOT belongs to the list:

A.
user.log
A.
user.log
Answers
B.
auth.fesg
B.
auth.fesg
Answers
C.
wtmp
C.
wtmp
Answers
D.
btmp
D.
btmp
Answers
Suggested answer: C

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

A.
network Sniffer
A.
network Sniffer
Answers
B.
Vulnerability Scanner
B.
Vulnerability Scanner
Answers
C.
Intrusion prevention Server
C.
Intrusion prevention Server
Answers
D.
Security incident and event Monitoring
D.
Security incident and event Monitoring
Answers
Suggested answer: D

What is the main security service a cryptographic hash provides?

A.
Integrity and ease of computation
A.
Integrity and ease of computation
Answers
B.
Message authentication and collision resistance
B.
Message authentication and collision resistance
Answers
C.
Integrity and collision resistance
C.
Integrity and collision resistance
Answers
D.
Integrity and computational in-feasibility
D.
Integrity and computational in-feasibility
Answers
Suggested answer: D

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?

A.
Libpcap
A.
Libpcap
Answers
B.
Awinpcap
B.
Awinpcap
Answers
C.
Winprom
C.
Winprom
Answers
D.
Winpcap
D.
Winpcap
Answers
Suggested answer: D
Total 573 questions
Go to page: of 58