ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 37

Add to Whishlist

List of questions

Question 361

Report Export Collapse

Cross-site request forgery involves:

Become a Premium Member for full access
  Unlock Premium Member

Question 362

Report Export Collapse

Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?

Become a Premium Member for full access
  Unlock Premium Member

Question 363

Report Export Collapse

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

Become a Premium Member for full access
  Unlock Premium Member

Question 364

Report Export Collapse

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

Become a Premium Member for full access
  Unlock Premium Member

Question 365

Report Export Collapse

Which of the following scanning method splits the TCP header into several packets and makes it difficult for packet filters to detect the purpose of the packet?

Become a Premium Member for full access
  Unlock Premium Member

Question 366

Report Export Collapse

You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?

Become a Premium Member for full access
  Unlock Premium Member

Question 367

Report Export Collapse

A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server?

Become a Premium Member for full access
  Unlock Premium Member

Question 368

Report Export Collapse

How can rainbow tables be defeated?

Become a Premium Member for full access
  Unlock Premium Member

Question 369

Report Export Collapse

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bab denies that he had ever sent a mail.

What do you want to ""know"" to prove yourself that it was Bob who had send a mail?

Become a Premium Member for full access
  Unlock Premium Member

Question 370

Report Export Collapse

Attempting an injection attack on a web server based on responses to True/False

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions