ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

A.
Kismet
A.
Kismet
Answers
B.
Abel
B.
Abel
Answers
C.
Netstumbler
C.
Netstumbler
Answers
D.
Nessus
D.
Nessus
Answers
Suggested answer: A

Explanation:

https://en.wikipedia.org/wiki/Kismet_(software)

Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs.

Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic.

Incorrect answers:

Nessus https://en.wikipedia.org/wiki/Nessus_(software)

Nessus is a remote security scanning tool that scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to access any computer you have connected to a network.

Nmap https://en.wikipedia.org/wiki/Nmap

Nmap (Network Mapper) is a free and open-source network scanner created by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich). Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses.

Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. These features are extensible by scripts that provide more advanced service detection, vulnerability detection, and other features. Nmap can adapt to network conditions including latency and congestion during a scan.

Abel https://en.wikipedia.org/wiki/Cain_and_Abel_(software) Cain and Abel (often abbreviated to Cain) was a password recovery tool for Microsoft Windows. It could recover many kinds of passwords using methods such as network packet sniffing, cracking various password hashes by using methods such as dictionary attacks, brute force and cryptanalysis attacks. Cryptanalysis attacks were done via rainbow tables which could be generated with the winrtgen.exe program provided with Cain and Abel.

Scenario1:

A.
Victim opens the attacker's web site.
A.
Victim opens the attacker's web site.
Answers
B.
Attacker sets up a web site which contains interesting and attractive content like 'Do you want to make $1000 in a day?'.
B.
Attacker sets up a web site which contains interesting and attractive content like 'Do you want to make $1000 in a day?'.
Answers
C.
Victim clicks to the interesting and attractive content URL.
C.
Victim clicks to the interesting and attractive content URL.
Answers
D.
Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he/she clicks to the content or URL that exists in the transparent 'iframe' which is setup by the attacker.What is the name of the attack which is mentioned in the scenario?
D.
Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' URL but actually he/she clicks to the content or URL that exists in the transparent 'iframe' which is setup by the attacker.What is the name of the attack which is mentioned in the scenario?
Answers
E.
Session Fixation
E.
Session Fixation
Answers
F.
HTML Injection
F.
HTML Injection
Answers
G.
HTTP Parameter Pollution
G.
HTTP Parameter Pollution
Answers
H.
Clickjacking Attack
H.
Clickjacking Attack
Answers
Suggested answer: D

Explanation:

https://en.wikipedia.org/wiki/Clickjacking Clickjacking is an attack that tricks a user into clicking a webpage element which is invisible or disguised as another element. This can cause users to unwittingly download malware, visit malicious web pages, provide credentials or sensitive information, transfer money, or purchase products online.

Typically, clickjacking is performed by displaying an invisible page or HTML element, inside an iframe, on top of the page the user sees. The user believes they are clicking the visible page but in fact they are clicking an invisible element in the additional page transposed on top of it.

A network administrator discovers several unknown files in the root directory of his Linux FTP server.

One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged in to the server, uploaded the files, and extracted the contents of the tarball and ran the script using a function provided by the FTP server's software. The "ps" command shows that the "nc" file is running as process, and the netstat command shows the "nc" process is listening on a network port.

What kind of vulnerability must be present to make this remote attack possible?

A.
File system permissions
A.
File system permissions
Answers
B.
Privilege escalation
B.
Privilege escalation
Answers
C.
Directory traversal
C.
Directory traversal
Answers
D.
Brute force login
D.
Brute force login
Answers
Suggested answer: A

Explanation:

File system permissions Processes may automatically execute specific binaries as part of their functionality or to perform other actions. If the permissions on the file system directory containing a target binary, or permissions on the binary itself, are improperly set, then the target binary may be overwritten with another binary using user-level permissions and executed by the original process. If the original process and thread are running under a higher permissions level, then the replaced binary will also execute under higher-level permissions, which could include SYSTEM.

Adversaries may use this technique to replace legitimate binaries with malicious ones as a means of executing code at a higher permissions level. If the executing process is set to run at a specific time or during a certain event (e.g., system bootup) then this technique can also be used for persistence.

Which method of password cracking takes the most time and effort?

A.
Dictionary attack
A.
Dictionary attack
Answers
B.
Shoulder surfing
B.
Shoulder surfing
Answers
C.
Rainbow tables
C.
Rainbow tables
Answers
D.
Brute force
D.
Brute force
Answers
Suggested answer: D

Explanation:

Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends on the set of predefined values. It will take more time if it is larger, but there is a better probability of success. In a traditional brute-force attack, the passcode or password is incrementally increased by one letter/number each time until the right passcode/password is found.

What does the –oX flag do in an Nmap scan?

A.
Perform an eXpress scan
A.
Perform an eXpress scan
Answers
B.
Output the results in truncated format to the screen
B.
Output the results in truncated format to the screen
Answers
C.
Output the results in XML format to a file
C.
Output the results in XML format to a file
Answers
D.
Perform an Xmas scan
D.
Perform an Xmas scan
Answers
Suggested answer: C

Explanation:

https://nmap.org/book/man-output.html -oX - Requests that XML output be directed to the given filename.

Incorrect answers:

Run an express scan https://nmap.org/book/man-port-specification.htmlThere is no express scan in Nmap, but there is a fast scan.

-F (Fast (limited port) scan) Specifies that you wish to scan fewer ports than the default. Normally Nmap scans the most common 1,000 ports for each scanned protocol. With -F, this is reduced to 100.

Or we can influence the intensity (and speed) of the scan with the -T flag. https://nmap.org/book/man-performance.html -T paranoid|sneaky|polite|normal|aggressive|insane Output the results in truncated format to the screen https://nmap.org/book/man-output.html -oG (grepable output) It is a simple format that lists each host on one line and can be trivially searched and parsed with standard Unix tools such as grep, awk, cut, sed, diff, and Perl.

Run a Xmas scan https://nmap.org/book/man-port-scanning-techniques.htmlXmas scan (-sX)Sets the FIN, PSH, and URG flags, lighting the packet up like a Christmas tree.

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

A.
Perform a vulnerability scan of the system.
A.
Perform a vulnerability scan of the system.
Answers
B.
Determine the impact of enabling the audit feature.
B.
Determine the impact of enabling the audit feature.
Answers
C.
Perform a cost/benefit analysis of the audit feature.
C.
Perform a cost/benefit analysis of the audit feature.
Answers
D.
Allocate funds for staffing of audit log review.
D.
Allocate funds for staffing of audit log review.
Answers
Suggested answer: B

Which Intrusion Detection System is the best applicable for large environments where critical assets on the network need extra scrutiny and is ideal for observing sensitive network segments?

A.
Honeypots
A.
Honeypots
Answers
B.
Firewalls
B.
Firewalls
Answers
C.
Network-based intrusion detection system (NIDS)
C.
Network-based intrusion detection system (NIDS)
Answers
D.
Host-based intrusion detection system (HIDS)
D.
Host-based intrusion detection system (HIDS)
Answers
Suggested answer: C

The collection of potentially actionable, overt, and publicly available information is known as

A.
Open-source intelligence
A.
Open-source intelligence
Answers
B.
Real intelligence
B.
Real intelligence
Answers
C.
Social intelligence
C.
Social intelligence
Answers
D.
Human intelligence
D.
Human intelligence
Answers
Suggested answer: A

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

A.
Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
A.
Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.
Answers
B.
Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
B.
Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.
Answers
C.
Symmetric encryption allows the server to security transmit the session keys out-of-band.
C.
Symmetric encryption allows the server to security transmit the session keys out-of-band.
Answers
D.
Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
D.
Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.
Answers
Suggested answer: A

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300.

It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and

ALE. Assume the EF = 1(100%). What is the closest approximate cost of this replacement and recovery operation per year?

A.
$1320
A.
$1320
Answers
B.
$440
B.
$440
Answers
C.
$100
C.
$100
Answers
D.
$146
D.
$146
Answers
Suggested answer: D

Explanation:

1. AV (Asset value) = $300 + (14 * $10) = $440 - the cost of a hard drive plus the work of a recovery person, i.e.how much would it take to replace 1 asset? 10 hours for resorting the OS and soft + 4 hours for DB restore multiplies by hourly rate of the recovery person.

2. SLE (Single Loss Expectancy) = AV * EF (Exposure Factor) = $440 * 1 = $440 3. ARO (Annual rate of occurrence) = 1/3 (every three years, meaning the probability of occurring during 1 years is 1/3) 4. ALE (Annual Loss Expectancy) =

SLE * ARO = 0.33 * $440 = $145.2

Total 573 questions
Go to page: of 58