ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











Which Nmap switch helps evade IDS or firewalls?

A.
-n/-R
A.
-n/-R
Answers
B.
-0N/-0X/-0G
B.
-0N/-0X/-0G
Answers
C.
-T
C.
-T
Answers
D.
-D
D.
-D
Answers
Suggested answer: C

Harper, a software engineer, is developing an email application. To ensure the confidentiality of email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes (S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent rotation, and XOR operations. This cipher also uses a masking key(Km1)and a rotation key (Kr1) for performing its functions. What is the algorithm employed by Harper to secure the email messages?

A.
CAST-128
A.
CAST-128
Answers
B.
AES
B.
AES
Answers
C.
GOST block cipher
C.
GOST block cipher
Answers
D.
DES
D.
DES
Answers
Suggested answer: A

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

A.
[inurl:]
A.
[inurl:]
Answers
B.
[related:]
B.
[related:]
Answers
C.
[info:]
C.
[info:]
Answers
D.
[site:]
D.
[site:]
Answers
Suggested answer: B

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept. What is the Wi-Fi encryption technology implemented by Debry Inc.?

A.
WEP
A.
WEP
Answers
B.
WPA
B.
WPA
Answers
C.
WPA2
C.
WPA2
Answers
D.
WPA3
D.
WPA3
Answers
Suggested answer: D

Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections. Which of the following attack techniques is used by Stella to compromise the web services?

A.
XML injection
A.
XML injection
Answers
B.
WS-Address spoofing
B.
WS-Address spoofing
Answers
C.
SOAPAction spoofing
C.
SOAPAction spoofing
Answers
D.
Web services parsing attacks
D.
Web services parsing attacks
Answers
Suggested answer: B

Explanation:

WS-Address provides additional routing information in the SOAP header to support asynchronous communication. This technique allows the transmission of web service requests and response messages using different TCP connections

https://www.google.com/search?client=firefox-b-d&q=WS-Address+spoofing CEH V11 Module 14 Page 1896

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an opensource framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources. What is the framework used by James to conduct footprinting and reconnaissance activities?

A.
WebSploit Framework
A.
WebSploit Framework
Answers
B.
Browser Exploitation Framework
B.
Browser Exploitation Framework
Answers
C.
OSINT framework
C.
OSINT framework
Answers
D.
SpeedPhish Framework
D.
SpeedPhish Framework
Answers
Suggested answer: C

Thomas, a cloud security professional, is performing security assessment on cloud services to identify any loopholes. He detects a vulnerability in a bare-metal cloud server that can enable hackers to implant malicious backdoors in its firmware. He also identified that an installed backdoor can persist even if the server is reallocated to new clients or businesses that use it as an laaS.

What is the type of cloud attack that can be performed by exploiting the vulnerability discussed in the above scenario?

A.
Man-in-the-cloud (MITC) attack
A.
Man-in-the-cloud (MITC) attack
Answers
B.
Cloud cryptojacking
B.
Cloud cryptojacking
Answers
C.
Cloudborne attack
C.
Cloudborne attack
Answers
D.
Metadata spoofing attack
D.
Metadata spoofing attack
Answers
Suggested answer: C

Which among the following is the best example of the third step (delivery) in the cyber kill chain?

A.
An intruder sends a malicious attachment via email to a target.
A.
An intruder sends a malicious attachment via email to a target.
Answers
B.
An intruder creates malware to be used as a malicious attachment to an email.
B.
An intruder creates malware to be used as a malicious attachment to an email.
Answers
C.
An intruder's malware is triggered when a target opens a malicious email attachment.
C.
An intruder's malware is triggered when a target opens a malicious email attachment.
Answers
D.
An intruder's malware is installed on a target's machine.
D.
An intruder's malware is installed on a target's machine.
Answers
Suggested answer: A

Dayn, an attacker, wanted to detect if any honeypots are installed in a target network. For this purpose, he used a time-based TCP fingerprinting method to validate the response to a normal computer and the response of a honeypot to a manual SYN request. Which of the following techniques is employed by Dayn to detect honeypots?

A.
Detecting honeypots running on VMware
A.
Detecting honeypots running on VMware
Answers
B.
Detecting the presence of Honeyd honeypots
B.
Detecting the presence of Honeyd honeypots
Answers
C.
Detecting the presence of Snort_inline honeypots
C.
Detecting the presence of Snort_inline honeypots
Answers
D.
Detecting the presence of Sebek-based honeypots
D.
Detecting the presence of Sebek-based honeypots
Answers
Suggested answer: C

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

A.
Rootkit
A.
Rootkit
Answers
B.
Trojan
B.
Trojan
Answers
C.
Worm
C.
Worm
Answers
D.
Adware
D.
Adware
Answers
Suggested answer: C
Total 573 questions
Go to page: of 58