ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 32

List of questions

Question 311

Report Export Collapse

which of the following protocols can be used to secure an LDAP service against anonymous queries?

Become a Premium Member for full access
  Unlock Premium Member

Question 312

Report Export Collapse

Allen, a professional pen tester, was hired by xpertTech solutWns to perform an attack simulation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. B/ enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration. identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?

Become a Premium Member for full access
  Unlock Premium Member

Question 313

Report Export Collapse

what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

Become a Premium Member for full access
  Unlock Premium Member

Question 314

Report Export Collapse

What is the first step for a hacker conducting a DNS cache poisoning (DNS spoofing) attack against an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 315

Report Export Collapse

in an attempt to increase the security of your network, you Implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know It. How do you accomplish this?

Become a Premium Member for full access
  Unlock Premium Member

Question 316

Report Export Collapse

what is the port to block first in case you are suspicious that an loT device has been compromised?

Become a Premium Member for full access
  Unlock Premium Member

Question 317

Report Export Collapse

Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate dat a. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?

Become a Premium Member for full access
  Unlock Premium Member

Question 318

Report Export Collapse

Morris, a professional hacker, performed a vulnerability scan on a target organization by sniffing the traffic on the network lo identify the active systems, network services, applications, and vulnerabilities. He also obtained the list of the users who are currently accessing the network. What is the type of vulnerability assessment that Morris performed on the target organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 319

Report Export Collapse

Bob, an attacker, has managed to access a target loT device. He employed an online tool to gather information related to the model of the loT device and the certifications granted to it. Which of the following tools did Bob employ to gather the above Information?

Become a Premium Member for full access
  Unlock Premium Member

Question 320

Report Export Collapse

Larry, a security professional in an organization, has noticed some abnormalities In the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a countermeasures to secure the accounts on the web server.

Which of the following countermeasures must Larry implement to secure the user accounts on the web server?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions