ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 45

Question list
Search
Search

List of questions

Search

Related questions











A group of hackers were roaming around a bank office building in a city, driving a luxury car. They were using hacking tools on their laptop with the intention to find a free-access wireless network.

What is this hacking process known as?

A.
GPS mapping
A.
GPS mapping
Answers
B.
Spectrum analysis
B.
Spectrum analysis
Answers
C.
Wardriving
C.
Wardriving
Answers
D.
Wireless sniffing
D.
Wireless sniffing
Answers
Suggested answer: C

John, a security analyst working for an organization, found a critical vulnerability on the organization's LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later. What would John be considered as?

A.
Cybercriminal
A.
Cybercriminal
Answers
B.
Black hat
B.
Black hat
Answers
C.
White hat
C.
White hat
Answers
D.
Gray hat
D.
Gray hat
Answers
Suggested answer: D

BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from

Active Directory. What is this mechanism called in cryptography?

A.
Key archival
A.
Key archival
Answers
B.
Key escrow.
B.
Key escrow.
Answers
C.
Certificate rollover
C.
Certificate rollover
Answers
D.
Key renewal
D.
Key renewal
Answers
Suggested answer: B

Miley, a professional hacker, decided to attack a target organization's network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target system's IP address. By performing this, Miley received messages directed to the victim's MAC address and further used the tool to intercept, steal, modify, and block sensitive communication to the target system. What is the tool employed by Miley to perform the above attack?

A.
Gobbler
A.
Gobbler
Answers
B.
KDerpNSpoof
B.
KDerpNSpoof
Answers
C.
BetterCAP
C.
BetterCAP
Answers
D.
Wireshark
D.
Wireshark
Answers
Suggested answer: C

Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device. Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives. What is the tool employed by Mason in the above scenario?

A.
NetPass.exe
A.
NetPass.exe
Answers
B.
Outlook scraper
B.
Outlook scraper
Answers
C.
WebBrowserPassView
C.
WebBrowserPassView
Answers
D.
Credential enumerator
D.
Credential enumerator
Answers
Suggested answer: D

Explanation:

https://us-cert.cisa.gov/ncas/alerts/TA18-201ACurrently, Emotet uses five known spreader modules: NetPass.exe, WebBrowserPassView, Mail PassView, Outlook scraper, and a credential enumerator. Credential enumerator is a self- extracting RAR file containing two components: a bypass component and a service component. The bypass component is used for the enumeration of network resources and either finds writable share drives using Server Message Block (SMB) or tries to brute force user accounts, including the administrator account. Once an available system is found, Emotet writes the service component on the system, which writes Emotet onto the disk. Emotet's access to SMB can result in the infection of entire domains (servers and clients).

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?

A.
WPA3-Personal
A.
WPA3-Personal
Answers
B.
WPA2-Enterprise
B.
WPA2-Enterprise
Answers
C.
Bluetooth
C.
Bluetooth
Answers
D.
ZigBee
D.
ZigBee
Answers
Suggested answer: D

A "Server-Side Includes" attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely.

Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?

A.
.stm
A.
.stm
Answers
B.
.html
B.
.html
Answers
C.
.rss
C.
.rss
Answers
D.
.cms
D.
.cms
Answers
Suggested answer: A

Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?

] >

A.
XXE
A.
XXE
Answers
B.
SQLi
B.
SQLi
Answers
C.
IDOR
C.
IDOR
Answers
D.
XXS
D.
XXS
Answers
Suggested answer: A

Which of the following allows attackers to draw a map or outline the target organization's network infrastructure to know about the actual environment that they are going to hack.

A.
Enumeration
A.
Enumeration
Answers
B.
Vulnerability analysis
B.
Vulnerability analysis
Answers
C.
Malware analysis
C.
Malware analysis
Answers
D.
Scanning networks
D.
Scanning networks
Answers
Suggested answer: D

Explanation:

Objectives of Footprinting Draw Network Map - Combining footprinting techniques with tools such as Tracert allows the attacker to create diagrammatic representations of the target organization's network presence. Specficially, it allows attackers to draw a map or outline of the target organization's network infrastructure to know about the actual environment that they are going to break into. These network diagrams can guide the attacker in performing an attack. (P.114/98)

Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network.

Using this technique, he also imposed conditions such that employees can access only the resources required for their role.

What is the technique employed by Eric to secure cloud resources?

A.
Serverless computing
A.
Serverless computing
Answers
B.
Demilitarized zone
B.
Demilitarized zone
Answers
C.
Container technology
C.
Container technology
Answers
D.
Zero trust network
D.
Zero trust network
Answers
Suggested answer: D

Explanation:

Zero Trust Networks The Zero Trust model is a security implementation that by default assumes every user trying to access the network is not a trusted entity and verifies every incoming connection before allowing access to the network.It strictly follows the principle, "Trust no one and validate before providing a cloud service or granting access permission."It also allows companies to impose conditions, such as allowing employees to only access the appropriate resources required for their work role. (P.2997/2981) Zero Trust is a strategic initiative that helps prevent successful data breaches by eliminating the concept of trust from an organization's network architecture. Rooted in the principle of "never trust, always verify," Zero Trust is designed to protect modern digital environments by leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular user-access control.

Total 573 questions
Go to page: of 58