ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 44

Add to Whishlist

List of questions

Question 431

Report Export Collapse

Which Nmap switch helps evade IDS or firewalls?

Become a Premium Member for full access
  Unlock Premium Member

Question 432

Report Export Collapse

Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key(Km1)and a rotation key (Kr1) for performing its functions. What is the algorithm employed by Harper to secure the email messages?

Become a Premium Member for full access
  Unlock Premium Member

Question 433

Report Export Collapse

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

Become a Premium Member for full access
  Unlock Premium Member

Question 434

Report Export Collapse

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept. What is the Wi-Fi encryption technology implemented by Debry Inc.?

Become a Premium Member for full access
  Unlock Premium Member

Question 435

Report Export Collapse

Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections. Which of the following attack techniques is used by Stella to compromise the web services?

Become a Premium Member for full access
  Unlock Premium Member

Question 436

Report Export Collapse

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an opensource framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources. What is the framework used by James to conduct footprinting and reconnaissance activities?

Become a Premium Member for full access
  Unlock Premium Member

Question 437

Report Export Collapse

Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an laaS.

What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 438

Report Export Collapse

Which among the following is the best example of the third step (delivery) in the cyber kill chain?

Become a Premium Member for full access
  Unlock Premium Member

Question 439

Report Export Collapse

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?

Become a Premium Member for full access
  Unlock Premium Member

Question 440

Report Export Collapse

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions