ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 40

Add to Whishlist

List of questions

Question 391

Report Export Collapse

What is the least important information when you analyze a public IP address in a security alert?

Become a Premium Member for full access
  Unlock Premium Member

Question 392

Report Export Collapse

You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are starting an investigation to roughly analyze the severity of the situation. Which of the following is appropriate to analyze?

Become a Premium Member for full access
  Unlock Premium Member

Question 393

Report Export Collapse

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

Become a Premium Member for full access
  Unlock Premium Member

Question 394

Report Export Collapse

From the following table, identify the wrong answer in terms of Range (ft).

Standard Range (ft)

802.11a 150-150

802.11b 150-150

802.11g 150-150

802.16 (WiMax) 30 miles

Become a Premium Member for full access
  Unlock Premium Member

Question 395

Report Export Collapse

Which tool can be used to silently copy files from USB devices?

Become a Premium Member for full access
  Unlock Premium Member

Question 396

Report Export Collapse

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed.

Which security policy must the security analyst check to see if dial-out modems are allowed?

Become a Premium Member for full access
  Unlock Premium Member

Question 397

Report Export Collapse

ping-* 6 192.168.0.101 Output:

Pinging 192.168.0.101 with 32 bytes of data:

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101:

Ping statistics for 192.168.0101

Packets: Sent = 6, Received = 6, Lost = 0 (0% loss).

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

What does the option * indicate?

Become a Premium Member for full access
  Unlock Premium Member

Question 398

Report Export Collapse

Which of the following is a passive wireless packet analyzer that works on Linux-based systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 399

Report Export Collapse

A company's Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.

What kind of Web application vulnerability likely exists in their software?

Become a Premium Member for full access
  Unlock Premium Member

Question 400

Report Export Collapse

On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service.

What is the name of the process by which you can determine those critical businesses?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions