ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 38

Add to Whishlist

List of questions

Question 371

Report Export Collapse

What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?

Become a Premium Member for full access
  Unlock Premium Member

Question 372

Report Export Collapse

The security administrator of PLUS needs to permit Internet traffic in the host 10.0.0.2 and UDP traffic in the host 10.0.0.3. He also needs to permit all FTP traffic to the rest of the network and deny all other traffic.

After he applied his ACL configuration in the router, nobody can access the ftp, and the permitted hosts cannot access the Internet. According to the next configuration, what is happening in the network? access-list 102 deny tcp any any access-list 104 permit udp host 10.0.0.3 any access-list 110 permit tcp host 10.0.0.2 eq www any access-list 108 permit tcp any eq ftp any

Become a Premium Member for full access
  Unlock Premium Member

Question 373

Report Export Collapse

Which of the following provides a security professional with most information about the system's security posture?

Become a Premium Member for full access
  Unlock Premium Member

Question 374

Report Export Collapse

Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 375

Report Export Collapse

An attacker scans a host with the below command. Which three flags are set?

# nmap -sX host.domain.com

Become a Premium Member for full access
  Unlock Premium Member

Question 376

Report Export Collapse

If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?

Become a Premium Member for full access
  Unlock Premium Member

Question 377

Report Export Collapse

Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 378

Report Export Collapse

What would you enter if you wanted to perform a stealth scan using Nmap?

Become a Premium Member for full access
  Unlock Premium Member

Question 379

Report Export Collapse

Which protocol is used for setting up secure channels between two devices, typically in VPNs?

Become a Premium Member for full access
  Unlock Premium Member

Question 380

Report Export Collapse

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through.

invictus@victim_server.~$ nmap -T4 -O 10.10.0.0/24 TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING!

What seems to be wrong?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions