ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 41

Add to Whishlist

List of questions

Question 401

Report Export Collapse

What type of a vulnerability/attack is it when the malicious person forces the user's browser to send an authenticated request to a server?

Become a Premium Member for full access
  Unlock Premium Member

Question 402

Report Export Collapse

Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP).

Which of the following is an incorrect definition or characteristics of the protocol?

Become a Premium Member for full access
  Unlock Premium Member

Question 403

Report Export Collapse

A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firm's public facing web servers. The engineer decides to start by using netcat to port 80.

The engineer receives this output:

HTTP/1.1 200 OK

Server: Microsoft-IIS/6

Expires: Tue, 17 Jan 2011 01:41:33 GMT

Date: Mon, 16 Jan 2011 01:41:33 GMT

Content-Type: text/html

Accept-Ranges: bytes

Last Modified: Wed, 28 Dec 2010 15:32:21 GMT

ETag:"b0aac0542e25c31:89d"

Content-Length: 7369

Which of the following is an example of what the engineer performed?

Become a Premium Member for full access
  Unlock Premium Member

Question 404

Report Export Collapse

The network in PLUS company is using the network address 192.168.1.64 with mask 255.255.255.192.

In the network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124. An attacker is trying to find those servers but he cannot see them in his scanning. The command he is using is: nmap 192.168.1.64/28.

Why he cannot see the servers?

Become a Premium Member for full access
  Unlock Premium Member

Question 405

Report Export Collapse

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database.

< iframe src=""http://www.vulnweb.com/updateif.php"" style=""display:none"" > < /iframe > What is this type of attack (that can use either HTTP GET or HTTP POST) called?

Become a Premium Member for full access
  Unlock Premium Member

Question 406

Report Export Collapse

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 407

Report Export Collapse

When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities.

You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.

What proxy tool will help you find web vulnerabilities?

Become a Premium Member for full access
  Unlock Premium Member

Question 408

Report Export Collapse

Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

Become a Premium Member for full access
  Unlock Premium Member

Question 409

Report Export Collapse

Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.

Which of the following master components is explained in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 410

Report Export Collapse

_________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions