ECCouncil 312-50v12 Practice Test - Questions Answers, Page 38

List of questions
Question 371

What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?
Question 372

The security administrator of PLUS needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic.
After he applied his ACL configuration in the router, nobody can access the ftp, and the permitted hosts cannot access the Internet. According to the next configuration, what is happening in the network? access-list 102 deny tcp any any access-list 104 permit udp host 10.0.0.3 any access-list 110 permit tcp host 10.0.0.2 eq www any access-list 108 permit tcp any eq ftp any
Question 373

Which of the following provides a security professional with most information about the system's security posture?
Question 374

Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?
Question 375

An attacker scans a host with the below command. Which three flags are set?
# nmap -sX host.domain.com
Question 376

If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?
Question 377

Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?
Question 378

What would you enter if you wanted to perform a stealth scan using Nmap?
Question 379

Which protocol is used for setting up secure channels between two devices, typically in VPNs?
Question 380

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.
invictus@victim_server.~$ nmap -T4 -O 10.10.0.0/24 TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING!
What seems to be wrong?
Question