ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











Peter, a system administrator working at a reputed IT firm, decided to work from his home and login remotely. Later, he anticipated that the remote connection could be exposed to session hijacking. To curb this possibility, he implemented a technique that creates a safe and encrypted tunnel over a public network to securely send and receive sensitive information and prevent hackers from decrypting the data flow between the endpoints. What is the technique followed by

Peter to send files securely through a remote connection?

A.
DMZ
A.
DMZ
Answers
B.
SMB signing
B.
SMB signing
Answers
C.
VPN
C.
VPN
Answers
D.
Switch network
D.
Switch network
Answers
Suggested answer: C

An attacker can employ many methods to perform social engineering against unsuspecting employees, including scareware.

What is the best example of a scareware attack?

A.
A pop-up appears to a user stating, "You have won a free cruise! Click here to claim your prize!"
A.
A pop-up appears to a user stating, "You have won a free cruise! Click here to claim your prize!"
Answers
B.
A banner appears to a user stating, "Your account has been locked. Click here to reset your password and unlock your account."
B.
A banner appears to a user stating, "Your account has been locked. Click here to reset your password and unlock your account."
Answers
C.
A banner appears to a user stating, "Your Amazon order has been delayed. Click here to find out your new delivery date."
C.
A banner appears to a user stating, "Your Amazon order has been delayed. Click here to find out your new delivery date."
Answers
D.
A pop-up appears to a user stating, "Your computer may have been infected with spyware. Click here to install an anti-spyware tool to resolve this issue."
D.
A pop-up appears to a user stating, "Your computer may have been infected with spyware. Click here to install an anti-spyware tool to resolve this issue."
Answers
Suggested answer: D

Bill has been hired as a penetration tester and cyber security auditor for a major credit card company. Which information security standard is most applicable to his role?

A.
FISMA
A.
FISMA
Answers
B.
HITECH
B.
HITECH
Answers
C.
PCI-DSS
C.
PCI-DSS
Answers
D.
Sarbanes-OxleyAct
D.
Sarbanes-OxleyAct
Answers
Suggested answer: C

Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128,192, or 256 bits into a software program, which involves 32 rounds of computational operations that include substitution and permutation operations on four 32- bit word blocks using 8-variable S-boxes with 4-bit entry and 4-bit exit. Which of the following algorithms includes all the above features and can be integrated by Tony into the software program?

A.
TEA
A.
TEA
Answers
B.
CAST-128
B.
CAST-128
Answers
C.
RC5
C.
RC5
Answers
D.
serpent
D.
serpent
Answers
Suggested answer: C

Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line utility. Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?

A.
wash
A.
wash
Answers
B.
ntptrace
B.
ntptrace
Answers
C.
macof
C.
macof
Answers
D.
net View
D.
net View
Answers
Suggested answer: A

What type of virus is most likely to remain undetected by antivirus software?

A.
Cavity virus
A.
Cavity virus
Answers
B.
Stealth virus
B.
Stealth virus
Answers
C.
File-extension virus
C.
File-extension virus
Answers
D.
Macro virus
D.
Macro virus
Answers
Suggested answer: B

Ben purchased a new smartphone and received some updates on it through the OTA method. He received two messages: one with a PIN from the network operator and another asking him to enter the PIN received from the operator. As soon as he entered the PIN, the smartphone started functioning in an abnormal manner. What is the type of attack performed on Ben in the above scenario?

A.
Advanced SMS phishing
A.
Advanced SMS phishing
Answers
B.
Bypass SSL pinning
B.
Bypass SSL pinning
Answers
C.
Phishing
C.
Phishing
Answers
D.
Tap 'n ghost attack
D.
Tap 'n ghost attack
Answers
Suggested answer: A

Jack, a professional hacker, targets an organization and performs vulnerability scanning on the target web server to identify any possible weaknesses, vulnerabilities, and misconfigurations. In this process, Jack uses an automated tool that eases his work and performs vulnerability scanning to find hosts, services, and other vulnerabilities in the target server. Which of the following tools is used by Jack to perform vulnerability scanning?

A.
Infoga
A.
Infoga
Answers
B.
WebCopier Pro
B.
WebCopier Pro
Answers
C.
Netsparker
C.
Netsparker
Answers
D.
NCollector Studio
D.
NCollector Studio
Answers
Suggested answer: A

Stephen, an attacker, targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected into the sales software maintained in the victim's system. Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components. What is the attack technique used by Stephen to damage the industrial systems?

A.
Spear-phishing attack
A.
Spear-phishing attack
Answers
B.
SMishing attack
B.
SMishing attack
Answers
C.
Reconnaissance attack
C.
Reconnaissance attack
Answers
D.
HMI-based attack
D.
HMI-based attack
Answers
Suggested answer: A

Shiela is an information security analyst working at HiTech Security Solutions. She is performing service version discovery using Nmap to obtain information about the running services and their versions on a target system.

Which of the following Nmap options must she use to perform service version discovery on the target host?

A.
-SN
A.
-SN
Answers
B.
-SX
B.
-SX
Answers
C.
-sV
C.
-sV
Answers
D.
-SF
D.
-SF
Answers
Suggested answer: C
Total 573 questions
Go to page: of 58