ECCouncil 312-50v12 Practice Test - Questions Answers, Page 36

List of questions
Question 351

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.
What is the port scanning technique used by Sam to discover open ports?
Question 352

Based on the below log, which of the following sentences are true?
Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip
Question 353

You want to analyze packets on your wireless network. Which program would you use?
Question 354

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?
Question 355

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?
Question 356

Which of these is capable of searching for and locating rogue access points?
Question 357

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to.
Question 358

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?
Question 359

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is the most likely able to handle this requirement?
Question 360

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?
Question