ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 30

Add to Whishlist

List of questions

Question 291

Report Export Collapse

what is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?

Become a Premium Member for full access
  Unlock Premium Member

Question 292

Report Export Collapse

which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?

Become a Premium Member for full access
  Unlock Premium Member

Question 293

Report Export Collapse

Consider the following Nmap output:

ECCouncil 312-50v12 image Question 293 25023 09182024185522000000

what command-line parameter could you use to determine the type and version number of the web server?

Become a Premium Member for full access
  Unlock Premium Member

Question 294

Report Export Collapse

what are common files on a web server that can be misconfigured and provide useful Information for a hacker such as verbose error messages?

Become a Premium Member for full access
  Unlock Premium Member

Question 295

Report Export Collapse

infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

Become a Premium Member for full access
  Unlock Premium Member

Question 296

Report Export Collapse

which type of virus can change its own code and then cipher itself multiple times as it replicates?

Become a Premium Member for full access
  Unlock Premium Member

Question 297

Report Export Collapse

You are a penetration tester working to test the user awareness of the employees of the client xyz.

You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?

Become a Premium Member for full access
  Unlock Premium Member

Question 298

Report Export Collapse

Samuel a security administrator, is assessing the configuration of a web server. He noticed that the server permits SSlv2 connections, and the same private key certificate is used on a different server that allows SSLv2 connections. This vulnerability makes the web server vulnerable to attacks as the SSLv2 server can leak key information.

Which of the following attacks can be performed by exploiting the above vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 299

Report Export Collapse

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker Installed a scanner on a machine belonging to one of the vktims and scanned several machines on the same network to Identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 300

Report Export Collapse

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.

Identify the behavior of the adversary In the above scenario.

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions