ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 36

Add to Whishlist

List of questions

Question 351

Report Export Collapse

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

What is the port scanning technique used by Sam to discover open ports?

Become a Premium Member for full access
  Unlock Premium Member

Question 352

Report Export Collapse

Based on the below log, which of the following sentences are true?

Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip

Become a Premium Member for full access
  Unlock Premium Member

Question 353

Report Export Collapse

You want to analyze packets on your wireless network. Which program would you use?

Become a Premium Member for full access
  Unlock Premium Member

Question 354

Report Export Collapse

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?

Become a Premium Member for full access
  Unlock Premium Member

Question 355

Report Export Collapse

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

Become a Premium Member for full access
  Unlock Premium Member

Question 356

Report Export Collapse

Which of these is capable of searching for and locating rogue access points?

Become a Premium Member for full access
  Unlock Premium Member

Question 357

Report Export Collapse

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to.

Become a Premium Member for full access
  Unlock Premium Member

Question 358

Report Export Collapse

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

Become a Premium Member for full access
  Unlock Premium Member

Question 359

Report Export Collapse

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.

Which AAA protocol is the most likely able to handle this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 360

Report Export Collapse

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions