ECCouncil 312-50v12 Practice Test - Questions Answers, Page 36
List of questions
Related questions
Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.
What is the port scanning technique used by Sam to discover open ports?
Based on the below log, which of the following sentences are true?
Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip
You want to analyze packets on your wireless network. Which program would you use?
When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?
An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?
Which of these is capable of searching for and locating rogue access points?
You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to.
You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?
An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is the most likely able to handle this requirement?
Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?
Question