ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











Bella, a security professional working at an it firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames. and passwords are shared In plaintext, paving the way for hackers 10 perform successful session hijacking. To address this situation. Bella Implemented a protocol that sends data using encryption and digital certificates.

Which of the following protocols Is used by Bella?

A.
FTP
A.
FTP
Answers
B.
HTTPS
B.
HTTPS
Answers
C.
FTPS
C.
FTPS
Answers
D.
IP
D.
IP
Answers
Suggested answer: C

Explanation:

The File Transfer Protocol (FTP) is a standard organization convention utilized for the exchange of PC records from a worker to a customer on a PC organization. FTP is based on a customer worker model engineering utilizing separate control and information associations between the customer and the server.[1] FTP clients may validate themselves with an unmistakable book sign-in convention, ordinarily as a username and secret key, however can interface namelessly if the worker is designed to permit it. For secure transmission that ensures the username and secret phrase, and scrambles the substance, FTP is frequently made sure about with SSL/TLS (FTPS) or supplanted with SSH File Transfer

Protocol (SFTP).

The primary FTP customer applications were order line programs created prior to working frameworks had graphical UIs, are as yet dispatched with most Windows, Unix, and Linux working systems.[2][3] Many FTP customers and mechanization utilities have since been created for working areas, workers, cell phones, and equipment, and FTP has been fused into profitability applications, for example, HTML editors.

Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?

A.
Tier-1: Developer machines
A.
Tier-1: Developer machines
Answers
B.
Tier-4: Orchestrators
B.
Tier-4: Orchestrators
Answers
C.
Tier-3: Registries
C.
Tier-3: Registries
Answers
D.
Tier-2: Testing and accreditation systems
D.
Tier-2: Testing and accreditation systems
Answers
Suggested answer: D

Explanation:

The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls. formal declaration by a designated accrediting authority (DAA) or principal accrediting authority (PAA) that an information system is approved to operate at an acceptable level of risk, based on the implementation of an approved set of technical, managerial, and procedural safeguards. See authorization to operate (ATO). Rationale: The Risk Management Framework uses a new term to refer to this concept, and it is called authorization.

Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging. Synonymous with

Security Perimeter.

For the purposes of identifying the Protection Level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system. See authorization boundary.

Rationale: The Risk Management Framework uses a new term to refer to the concept of accreditation, and it is called authorization. Extrapolating, the accreditation boundary would then be referred to as the authorization boundary.

which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

A.
Bluesmacking
A.
Bluesmacking
Answers
B.
Bluebugging
B.
Bluebugging
Answers
C.
Bluejacking
C.
Bluejacking
Answers
D.
Bluesnarfing
D.
Bluesnarfing
Answers
Suggested answer: D

Explanation:

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant).

Topic 3, Exam Pool C

if you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST. what do you know about the firewall you are scanning?

A.
There is no firewall in place.
A.
There is no firewall in place.
Answers
B.
This event does not tell you encrypting about the firewall.
B.
This event does not tell you encrypting about the firewall.
Answers
C.
It is a stateful firewall
C.
It is a stateful firewall
Answers
D.
It Is a non-stateful firewall.
D.
It Is a non-stateful firewall.
Answers
Suggested answer: B

Samuel, a professional hacker, monitored and Intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with <| packet having an Incremented ISN. Consequently. Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob. What is the type of attack performed by Samuel in the above scenario?

A.
UDP hijacking
A.
UDP hijacking
Answers
B.
Blind hijacking
B.
Blind hijacking
Answers
C.
TCP/IP hacking
C.
TCP/IP hacking
Answers
D.
Forbidden attack
D.
Forbidden attack
Answers
Suggested answer: C

Explanation:

A TCP/IP hijack is an attack that spoofs a server into thinking it's talking with a sound client, once actually it's communication with an assaulter that has condemned (or hijacked) the tcp session.

Assume that the client has administrator-level privileges, which the attacker needs to steal that authority so as to form a brand new account with root-level access of the server to be used afterward. A tcp Hijacking is sort of a two-phased man-in-the-middle attack. The man-in-the-middle assaulter lurks within the circuit between a shopper and a server so as to work out what port and sequence numbers are being employed for the conversation.

First, the attacker knocks out the client with an attack, like Ping of Death, or ties it up with some reasonably ICMP storm. This renders the client unable to transmit any packets to the server. Then, with the client crashed, the attacker assumes the client's identity so as to talk with the server. By this suggests, the attacker gains administrator-level access to the server.

One of the most effective means of preventing a hijack attack is to want a secret, that's a shared secret between the shopper and also the server. looking on the strength of security desired, the key may be used for random exchanges. this is often once a client and server periodically challenge each other, or it will occur with each exchange, like Kerberos.

Dorian Is sending a digitally signed email to Polly, with which key is Dorian signing this message and how is Poly validating It?

A.
Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.
A.
Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.
Answers
B.
Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.
B.
Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.
Answers
C.
Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.
C.
Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.
Answers
D.
Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.
D.
Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.
Answers
Suggested answer: C

Explanation:

https://blog.mailfence.com/how-do-digital-signatures-work/

https://en.wikipedia.org/wiki/Digital_signature

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. It's the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security. A digital signature is intended to solve the problem of tampering and impersonation in digital communications.

Digital signatures can provide evidence of origin, identity, and status of electronic documents, transactions, or digital messages. Signers can also use them to acknowledge informed consent.

Digital signatures are based on public-key cryptography, also known as asymmetric cryptography.

Two keys are generated using a public key algorithm, such as RSA (Rivest-Shamir-Adleman), creating a mathematically linked pair of keys, one private and one public.

Digital signatures work through public-key cryptography's two mutually authenticating cryptographic keys. The individual who creates the digital signature uses a private key to encrypt signature-related data, while the only way to decrypt that data is with the signer's public key.

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?

A.
Dark web footprinting
A.
Dark web footprinting
Answers
B.
VoIP footpnnting
B.
VoIP footpnnting
Answers
C.
VPN footprinting
C.
VPN footprinting
Answers
D.
website footprinting
D.
website footprinting
Answers
Suggested answer: A

Explanation:

The deep web is the layer of the online cyberspace that consists of web pages and content that are hidden and unindexed.

An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware. Which of the following tools must the organization employ to protect its critical infrastructure?

A.
Robotium
A.
Robotium
Answers
B.
BalenaCloud
B.
BalenaCloud
Answers
C.
Flowmon
C.
Flowmon
Answers
D.
IntentFuzzer
D.
IntentFuzzer
Answers
Suggested answer: C

Explanation:

Source: https://www.flowmon.com Flowmon empowers manufacturers and utility companies to ensure the reliability of their industrial networks confidently to avoid downtime and disruption of service continuity. This can be achieved by continuous monitoring and anomaly detection so that malfunctioning devices or security incidents, such as cyber espionage, zero-days, or malware, can be reported and remedied as quickly as possible.

By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext.

Which file do you have to clean to clear the password?

A.
.X session-log
A.
.X session-log
Answers
B.
.bashrc
B.
.bashrc
Answers
C.
.profile
C.
.profile
Answers
D.
.bash_history
D.
.bash_history
Answers
Suggested answer: D

Explanation:

File created by Bash, a Unix-based shell program commonly used on Mac OS X and Linux operating systems; stores a history of user commands entered at the command prompt; used for viewing old commands that are executed.

BASH_HISTORY files are hidden files with no filename prefix. They always use the filename .bash_history.

NOTE: Bash is that the shell program employed by Apple Terminal.

Our goal is to assist you understand what a file with a *.bash_history suffix is and the way to open it.

The Bash History file type, file format description, and Mac and Linux programs listed on this page are individually researched and verified by the FileInfo team. we attempt for 100% accuracy and only publish information about file formats that we've tested and validated.

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on Don in the above scenario?

A.
SMS phishing attack
A.
SMS phishing attack
Answers
B.
SIM card attack
B.
SIM card attack
Answers
C.
Agent Smith attack
C.
Agent Smith attack
Answers
D.
Clickjacking
D.
Clickjacking
Answers
Suggested answer: C

Explanation:

Agent Smith Attack Agent Smith attacks are carried out by luring victims into downloading and installing malicious apps designed and published by attackers in the form of games, photo editors, or other attractive tools from third-party app stores such as 9Apps. Once the user has installed the app, the core malicious code inside the application infects or replaces the legitimate apps in the victim's mobile device C&C commands. The deceptive application replaces legitimate apps such as WhatsApp, SHAREit, and MX Player with similar infected versions. The application sometimes also appears to be an authentic Google product such as Google Updater or Themes. The attacker then produces a massive volume of irrelevant and fraudulent advertisements on the victim's device through the infected app for financial gain. Attackers exploit these apps to steal critical information such as personal information, credentials, and bank details, from the victim's mobile device through C&C commands.

Total 573 questions
Go to page: of 58