ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server?

The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.

A.
My Doom
A.
My Doom
Answers
B.
Astacheldraht
B.
Astacheldraht
Answers
C.
R-U-Dead-Yet?(RUDY)
C.
R-U-Dead-Yet?(RUDY)
Answers
D.
LOIC
D.
LOIC
Answers
Suggested answer: C

During the process of encryption and decryption, what keys are shared?

A.
Private keys
A.
Private keys
Answers
B.
User passwords
B.
User passwords
Answers
C.
Public keys
C.
Public keys
Answers
D.
Public and private keys
D.
Public and private keys
Answers
Suggested answer: C

Explanation:

https://en.wikipedia.org/wiki/Public-key_cryptography Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys (which may be known to others), and private keys (which may never be known by any except the owner). The generation of such key pairs depends on cryptographic algorithms which are based on mathematical problems termed one-way functions. Effective security requires keeping the private key private; the public key can be openly distributed without compromising security.

In such a system, any person can encrypt a message using the intended receiver's public key, but that encrypted message can only be decrypted with the receiver's private key. This allows, for instance, a server program to generate a cryptographic key intended for a suitable symmetric-key cryptography, then to use a client's openly-shared public key to encrypt that newly generated symmetric key. The server can then send this encrypted symmetric key over an insecure channel to the client; only the client can decrypt it using the client's private key (which pairs with the public key used by the server to encrypt the message). With the client and server both having the same symmetric key, they can safely use symmetric key encryption (likely much faster) to communicate over otherwise-insecure channels. This scheme has the advantage of not having to manually pre-share symmetric keys (a fundamentally difficult problem) while gaining the higher data throughput advantage of symmetrickey cryptography.

With public-key cryptography, robust authentication is also possible. A sender can combine a message with a private key to create a short digital signature on the message. Anyone with the sender's corresponding public key can combine that message with a claimed digital signature; if the signature matches the message, the origin of the message is verified (i.e., it must have been made by the owner of the corresponding private key).

Public key algorithms are fundamental security primitives in modern cryptosystems, including applications and protocols which offer assurance of the confidentiality, authenticity and nonrepudiability of electronic communications and data storage. They underpin numerous Internet standards, such as Transport Layer Security (TLS), S/MIME, PGP, and GPG. Some public key algorithms provide key distribution and secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g., Digital Signature Algorithm), and some provide both (e.g., RSA). Compared to symmetric encryption, asymmetric encryption is rather slower than good symmetric encryption, too slow for many purposes. Today's cryptosystems (such as TLS, Secure Shell) use both symmetric encryption and asymmetric encryption.

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity, what tool would you most likely select?

A.
Nmap
A.
Nmap
Answers
B.
Cain & Abel
B.
Cain & Abel
Answers
C.
Nessus
C.
Nessus
Answers
D.
Snort
D.
Snort
Answers
Suggested answer: D

How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender's identity?

A.
Hash value
A.
Hash value
Answers
B.
Private key
B.
Private key
Answers
C.
Digital signature
C.
Digital signature
Answers
D.
Digital certificate
D.
Digital certificate
Answers
Suggested answer: D

The network team has well-established procedures to follow for creating new rules on the firewall.

This includes having approval from a manager prior to implementing any new rules. While reviewing the firewall configuration, you notice a recently implemented rule but cannot locate manager approval for it. What would be a good step to have in the procedures for a situation like this?

A.
Have the network team document the reason why the rule was implemented without prior manager approval.
A.
Have the network team document the reason why the rule was implemented without prior manager approval.
Answers
B.
Monitor all traffic using the firewall rule until a manager can approve it.
B.
Monitor all traffic using the firewall rule until a manager can approve it.
Answers
C.
Do not roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.
C.
Do not roll back the firewall rule as the business may be relying upon it, but try to get manager approval as soon as possible.
Answers
D.
Immediately roll back the firewall rule until a manager can approve it
D.
Immediately roll back the firewall rule until a manager can approve it
Answers
Suggested answer: D

The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

A.
Regularly test security systems and processes.
A.
Regularly test security systems and processes.
Answers
B.
Encrypt transmission of cardholder data across open, public networks.
B.
Encrypt transmission of cardholder data across open, public networks.
Answers
C.
Assign a unique ID to each person with computer access.
C.
Assign a unique ID to each person with computer access.
Answers
D.
Use and regularly update anti-virus software on all systems commonly affected by malware.
D.
Use and regularly update anti-virus software on all systems commonly affected by malware.
Answers
Suggested answer: C

Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address.

What is the first thing that Nedved needs to do before contacting the incident response team?

A.
Leave it as it Is and contact the incident response te3m right away
A.
Leave it as it Is and contact the incident response te3m right away
Answers
B.
Block the connection to the suspicious IP Address from the firewall
B.
Block the connection to the suspicious IP Address from the firewall
Answers
C.
Disconnect the email server from the network
C.
Disconnect the email server from the network
Answers
D.
Migrate the connection to the backup email server
D.
Migrate the connection to the backup email server
Answers
Suggested answer: C

Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/ her password on a post it note and stick it to his/her desk, leaving the computer unlocked, didn't log out from emails or other social media accounts, and etc.

After discussing with his boss, Vlady decided to make some changes to improve the security environment in his company. The first thing that Vlady wanted to do is to make the employees understand the importance of keeping confidential information, such as password, a secret and they should not share it with other persons.

Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

A.
Warning to those who write password on a post it note and put it on his/her desk
A.
Warning to those who write password on a post it note and put it on his/her desk
Answers
B.
Developing a strict information security policy
B.
Developing a strict information security policy
Answers
C.
Information security awareness training
C.
Information security awareness training
Answers
D.
Conducting a one to one discussion with the other employees about the importance of information security
D.
Conducting a one to one discussion with the other employees about the importance of information security
Answers
Suggested answer: A

Clark, a professional hacker, was hired by an organization lo gather sensitive Information about its competitors surreptitiously. Clark gathers the server IP address of the target organization using Whole footprinting. Further, he entered the server IP address as an input to an online tool to retrieve information such as the network range of the target organization and to identify the network topology and operating system used in the network. What is the online tool employed by

Clark in the above scenario?

A.
AOL
A.
AOL
Answers
B.
ARIN
B.
ARIN
Answers
C.
DuckDuckGo
C.
DuckDuckGo
Answers
D.
Baidu
D.
Baidu
Answers
Suggested answer: B

Explanation:

https://search.arin.net/rdap/?query=199.43.0.43

Jim, a professional hacker, targeted an organization that is operating critical Industrial Infrastructure.

Jim used Nmap to scan open pons and running services on systems connected to the organization's OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered Information such as the vendor name, product code and name, device name, and IP address. Which of the following Nmap commands helped Jim retrieve the required information?

A.
nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >
A.
nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >
Answers
B.
nmap -Pn -sU -p 44818 --script enip-info < Target IP >
B.
nmap -Pn -sU -p 44818 --script enip-info < Target IP >
Answers
C.
nmap -Pn -sT -p 46824 < Target IP >
C.
nmap -Pn -sT -p 46824 < Target IP >
Answers
D.
nmap -Pn -sT -p 102 --script s7-info < Target IP >
D.
nmap -Pn -sT -p 102 --script s7-info < Target IP >
Answers
Suggested answer: B

Explanation:

https://nmap.org/nsedoc/scripts/enip-info.html

Example Usage enip-info:

- nmap --script enip-info -sU -p 44818 This NSE script is used to send a EtherNet/IP packet to a remote device that has TCP 44818 open. The script will send a Request Identity Packet and once a response is received, it validates that it was a proper response to the command that was sent, and then will parse out the data. Information that is parsed includes Device Type, Vendor ID, Product name, Serial Number, Product code, Revision Number, status, state, as well as the Device IP.

This script was written based of information collected by using the the Wireshark dissector for CIP, and EtherNet/IP, The original information was collected by running a modified version of the ethernetip.py script (https://github.com/ paperwork/pyenip)

Total 573 questions
Go to page: of 58