ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 25

Add to Whishlist

List of questions

Question 241

Report Export Collapse

This form of encryption algorithm is asymmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?

Become a Premium Member for full access
  Unlock Premium Member

Question 242

Report Export Collapse

Sam is working as a system administrator In an organization. He captured the principal characteristics of a vulnerability and produced a numerical score to reflect Its severity using CVSS v3.0 to property assess and prioritize the organization's vulnerability management processes. The base score that Sam obtained after performing cvss rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 243

Report Export Collapse

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

Become a Premium Member for full access
  Unlock Premium Member

Question 244

Report Export Collapse

Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability.

He sent an email to the owner of the public system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing them of the problem that their systems are exposed to. What type of hacker is Nicolas?

Become a Premium Member for full access
  Unlock Premium Member

Question 245

Report Export Collapse

You are a penetration tester tasked with testing the wireless network of your client Brakeme S

Become a Premium Member for full access
  Unlock Premium Member

Question 246

Report Export Collapse

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

Become a Premium Member for full access
  Unlock Premium Member

Question 247

Report Export Collapse

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

Become a Premium Member for full access
  Unlock Premium Member

Question 248

Report Export Collapse

What piece of hardware on a computer's motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

Become a Premium Member for full access
  Unlock Premium Member

Question 249

Report Export Collapse

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfilltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any nonwhitelisted programs, what type of malware did the attacker use to bypass the company's application whitelisting?

Become a Premium Member for full access
  Unlock Premium Member

Question 250

Report Export Collapse

Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions