ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 40

Question list
Search
Search

List of questions

Search

Related questions











What is the least important information when you analyze a public IP address in a security alert?

A.
DNS
A.
DNS
Answers
B.
Whois
B.
Whois
Answers
C.
Geolocation
C.
Geolocation
Answers
D.
ARP
D.
ARP
Answers
Suggested answer: D

You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are starting an investigation to roughly analyze the severity of the situation. Which of the following is appropriate to analyze?

A.
IDS log
A.
IDS log
Answers
B.
Event logs on domain controller
B.
Event logs on domain controller
Answers
C.
Internet Firewall/Proxy log.
C.
Internet Firewall/Proxy log.
Answers
D.
Event logs on the PC
D.
Event logs on the PC
Answers
Suggested answer: C

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

A.
Yagi antenna
A.
Yagi antenna
Answers
B.
Dipole antenna
B.
Dipole antenna
Answers
C.
Parabolic grid antenna
C.
Parabolic grid antenna
Answers
D.
Omnidirectional antenna
D.
Omnidirectional antenna
Answers
Suggested answer: A

From the following table, identify the wrong answer in terms of Range (ft).

Standard Range (ft)

802.11a 150-150

802.11b 150-150

802.11g 150-150

802.16 (WiMax) 30 miles

A.
802.16 (WiMax)
A.
802.16 (WiMax)
Answers
B.
802.11g
B.
802.11g
Answers
C.
802.11b
C.
802.11b
Answers
D.
802.11a
D.
802.11a
Answers
Suggested answer: A

Which tool can be used to silently copy files from USB devices?

A.
USB Grabber
A.
USB Grabber
Answers
B.
USB Snoopy
B.
USB Snoopy
Answers
C.
USB Sniffer
C.
USB Sniffer
Answers
D.
Use Dumper
D.
Use Dumper
Answers
Suggested answer: D

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed.

Which security policy must the security analyst check to see if dial-out modems are allowed?

A.
Firewall-management policy
A.
Firewall-management policy
Answers
B.
Acceptable-use policy
B.
Acceptable-use policy
Answers
C.
Permissive policy
C.
Permissive policy
Answers
D.
Remote-access policy
D.
Remote-access policy
Answers
Suggested answer: D

ping-* 6 192.168.0.101 Output:

Pinging 192.168.0.101 with 32 bytes of data:

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101:

Ping statistics for 192.168.0101

Packets: Sent = 6, Received = 6, Lost = 0 (0% loss).

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

What does the option * indicate?

A.
t
A.
t
Answers
B.
s
B.
s
Answers
C.
a
C.
a
Answers
D.
n
D.
n
Answers
Suggested answer: D

Which of the following is a passive wireless packet analyzer that works on Linux-based systems?

A.
Burp Suite
A.
Burp Suite
Answers
B.
OpenVAS
B.
OpenVAS
Answers
C.
tshark
C.
tshark
Answers
D.
Kismet
D.
Kismet
Answers
Suggested answer: C

A company's Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.

What kind of Web application vulnerability likely exists in their software?

A.
Cross-site scripting vulnerability
A.
Cross-site scripting vulnerability
Answers
B.
SQL injection vulnerability
B.
SQL injection vulnerability
Answers
C.
Web site defacement vulnerability
C.
Web site defacement vulnerability
Answers
D.
Gross-site Request Forgery vulnerability
D.
Gross-site Request Forgery vulnerability
Answers
Suggested answer: A

Explanation:

There is no single, standardized classification of cross-site scripting flaws, but most experts distinguish between at least two primary flavors of XSS flaws: non-persistent and persistent. In this issue, we consider the non-persistent cross-site scripting vulnerability.

The non-persistent (or reflected) cross-site scripting vulnerability is by far the most basic type of web vulnerability. These holes show up when the data provided by a web client, most commonly in HTTP query parameters (e.g. HTML form submission), is used immediately by server-side scripts to parse and display a page of results for and to that user, without properly sanitizing the content.

Because HTML documents have a flat, serial structure that mixes control statements, formatting, and the actual content, any non-validated user-supplied data included in the resulting page without proper HTML encoding, may lead to markup injection. A classic example of a potential vector is a site search engine: if one searches for a string, the search string will typically be redisplayed verbatim on the result page to indicate what was searched for. If this response does not properly escape or reject HTML control characters, a cross-site scripting flaw will ensue.

On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service.

What is the name of the process by which you can determine those critical businesses?

A.
Emergency Plan Response (EPR)
A.
Emergency Plan Response (EPR)
Answers
B.
Business Impact Analysis (BIA)
B.
Business Impact Analysis (BIA)
Answers
C.
Risk Mitigation
C.
Risk Mitigation
Answers
D.
Disaster Recovery Planning (DRP)
D.
Disaster Recovery Planning (DRP)
Answers
Suggested answer: B
Total 573 questions
Go to page: of 58