ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 39

Add to Whishlist

List of questions

Question 381

Report Export Collapse

What is the most common method to exploit the "Bash Bug" or "Shellshock" vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 382

Report Export Collapse

Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?

TCP port 21 no response

TCP port 22 no response

TCP port 23 Time-to-live exceeded

Become a Premium Member for full access
  Unlock Premium Member

Question 383

Report Export Collapse

#!/usr/bin/python import socket buffer=[""A""] counter=50 while len(buffer)<=100: buffer.append (""A""*counter) counter=counter+50 commands= [""HELP"",""STATS ."",""RTIME ."",""LTIME. "",""SRUN ."',""TRUN ."",""GMON ."",""GDOG ."",""KSTET .",""GTER ."",""HTER ."", ""LTER .",""KSTAN .""] for command in commands: for buffstring in buffer: print ""Exploiting"" +command +"":""+str(len(buffstring)) s=socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect

(('127.0.0.1', 9999)) s.recv(50) s.send(command+buffstring) s.close() What is the code written for?

Become a Premium Member for full access
  Unlock Premium Member

Question 384

Report Export Collapse

Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?

Become a Premium Member for full access
  Unlock Premium Member

Question 385

Report Export Collapse

In both pharming and phishing attacks, an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims.

What is the difference between pharming and phishing attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 386

Report Export Collapse

When configuring wireless on his home router, Javik disables SSID broadcast. He leaves authentication "open" but sets the SSID to a 32-character string of random letters and numbers.

What is an accurate assessment of this scenario from a security perspective?

Become a Premium Member for full access
  Unlock Premium Member

Question 387

Report Export Collapse

Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use in this context?

Become a Premium Member for full access
  Unlock Premium Member

Question 388

Report Export Collapse

Which of the following statements is TRUE?

Become a Premium Member for full access
  Unlock Premium Member

Question 389

Report Export Collapse

Insecure direct object reference is a type of vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key. Suppose a malicious user Rob tries to get access to the account of a benign user Ned.

Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?

Become a Premium Member for full access
  Unlock Premium Member

Question 390

Report Export Collapse

Mary found a high vulnerability during a vulnerability scan and notified her server team. After analysis, they sent her proof that a fix to that issue had already been applied. The vulnerability that Marry found is called what?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions