ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 22

Question list
Search
Search

Related questions











What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

A.
Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
A.
Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
Answers
B.
Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
B.
Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
Answers
C.
Symmetric encryption allows the server to securely transmit the session keys out-of-band.
C.
Symmetric encryption allows the server to securely transmit the session keys out-of-band.
Answers
D.
Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
D.
Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
Answers
Suggested answer: D

When a security analyst prepares for the formal security assessment - what of the following should be done in order to determine inconsistencies in the secure assets database and verify that system is compliant to the minimum security baseline?

A.
Data items and vulnerability scanning
A.
Data items and vulnerability scanning
Answers
B.
Interviewing employees and network engineers
B.
Interviewing employees and network engineers
Answers
C.
Reviewing the firewalls configuration
C.
Reviewing the firewalls configuration
Answers
D.
Source code review
D.
Source code review
Answers
Suggested answer: A

Why containers are less secure that virtual machines?

A.
Host OS on containers has a larger surface attack.
A.
Host OS on containers has a larger surface attack.
Answers
B.
Containers may full fill disk space of the host.
B.
Containers may full fill disk space of the host.
Answers
C.
A compromise container may cause a CPU starvation of the host.
C.
A compromise container may cause a CPU starvation of the host.
Answers
D.
Containers are attached to the same virtual network.
D.
Containers are attached to the same virtual network.
Answers
Suggested answer: A

These hackers have limited or no training and know how to use only basic techniques or tools.

What kind of hackers are we talking about?

A.
Black-Hat Hackers A
A.
Black-Hat Hackers A
Answers
B.
Script Kiddies
B.
Script Kiddies
Answers
C.
White-Hat Hackers
C.
White-Hat Hackers
Answers
D.
Gray-Hat Hacker
D.
Gray-Hat Hacker
Answers
Suggested answer: B

Explanation:

Script Kiddies: These hackers have limited or no training and know how to use only basictechniques or tools. Even then they may not understand any or all of what they are doing.

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days. Bob denies that he had ever sent a mail.

What do you want to ""know"" to prove yourself that it was Bob who had send a mail?

A.
Authentication
A.
Authentication
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Integrity
C.
Integrity
Answers
D.
Non-Repudiation
D.
Non-Repudiation
Answers
Suggested answer: D

Explanation:

Non-repudiation is the assurance that someone cannot deny the validity of something. Nonrepudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data. In other words, nonrepudiation makes it very difficult to successfully deny who/where a message came from as well as the authenticity and integrity of that message.

In the field of cryptanalysis, what is meant by a "rubber-hose" attack?

A.
Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.
A.
Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.
Answers
B.
Extraction of cryptographic secrets through coercion or torture.
B.
Extraction of cryptographic secrets through coercion or torture.
Answers
C.
Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.
C.
Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.
Answers
D.
A backdoor placed into a cryptographic algorithm by its creator.
D.
A backdoor placed into a cryptographic algorithm by its creator.
Answers
Suggested answer: B

What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?

A.
Black-box
A.
Black-box
Answers
B.
Announced
B.
Announced
Answers
C.
White-box
C.
White-box
Answers
D.
Grey-box
D.
Grey-box
Answers
Suggested answer: D

Which of the following steps for risk assessment methodology refers to vulnerability identification?

A.
Determines if any flaws exist in systems, policies, or procedures
A.
Determines if any flaws exist in systems, policies, or procedures
Answers
B.
Assigns values to risk probabilities; Impact values.
B.
Assigns values to risk probabilities; Impact values.
Answers
C.
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
C.
Determines risk probability that vulnerability will be exploited (High. Medium, Low)
Answers
D.
Identifies sources of harm to an IT system. (Natural, Human. Environmental)
D.
Identifies sources of harm to an IT system. (Natural, Human. Environmental)
Answers
Suggested answer: C

Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than twelve hours. What protocol used on Linux servers to synchronize the time has stopped working?

A.
Time Keeper
A.
Time Keeper
Answers
B.
NTP
B.
NTP
Answers
C.
PPP
C.
PPP
Answers
D.
OSPP
D.
OSPP
Answers
Suggested answer: B

What is the minimum number of network connections in a multi homed firewall?

A.
3
A.
3
Answers
B.
5
B.
5
Answers
C.
4
C.
4
Answers
D.
2
D.
2
Answers
Suggested answer: A
Total 573 questions
Go to page: of 58