ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 21

Add to Whishlist

List of questions

Question 201

Report Export Collapse

Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions.

Which of the following tools is he most likely using?

Become a Premium Member for full access
  Unlock Premium Member

Question 202

Report Export Collapse

Which of the following statements is FALSE with respect to Intrusion Detection Systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 203

Report Export Collapse

While scanning with Nmap, Patin found several hosts which have the IP ID of incremental sequences.

He then decided to conduct: nmap -Pn -p- -si kiosk.adobe.com www.riaa.com. kiosk.adobe.com is the host with incremental IP ID sequence. What is the purpose of using "-si" with Nmap?

Become a Premium Member for full access
  Unlock Premium Member

Question 204

Report Export Collapse

Which command can be used to show the current TCP/IP connections?

Become a Premium Member for full access
  Unlock Premium Member

Question 205

Report Export Collapse

You are analysing traffic on the network with Wireshark. You want to routinely run a cron job which will run the capture against a specific set of IPs - 192.168.8.0/24. What command you would use?

Become a Premium Member for full access
  Unlock Premium Member

Question 206

Report Export Collapse

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to.

Become a Premium Member for full access
  Unlock Premium Member

Question 207

Report Export Collapse

You have successfully logged on a Linux system. You want to now cover your trade Your login attempt may be logged on several files located in /var/log. Which file does NOT belongs to the list:

Become a Premium Member for full access
  Unlock Premium Member

Question 208

Report Export Collapse

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

Become a Premium Member for full access
  Unlock Premium Member

Question 209

Report Export Collapse

What is the main security service a cryptographic hash provides?

Become a Premium Member for full access
  Unlock Premium Member

Question 210

Report Export Collapse

A pen tester is configuring a Windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions