ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Related questions











Calvin, a software developer, uses a feature that helps him auto-generate the content of a web page without manual involvement and is integrated with SSI directives. This leads to a vulnerability in the developed web application as this feature accepts remote user inputs and uses them on the page.

Hackers can exploit this feature and pass malicious SSI directives as input values to perform malicious activities such as modifying and erasing server files. What is the type of injection attack Calvin's web application is susceptible to?

A.
Server-side template injection
A.
Server-side template injection
Answers
B.
Server-side JS injection
B.
Server-side JS injection
Answers
C.
CRLF injection
C.
CRLF injection
Answers
D.
Server-side includes injection
D.
Server-side includes injection
Answers
Suggested answer: D

John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the loT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of loT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the above scenario?

A.
loTSeeker
A.
loTSeeker
Answers
B.
loT Inspector
B.
loT Inspector
Answers
C.
AT&T loT Platform
C.
AT&T loT Platform
Answers
D.
Azure loT Central
D.
Azure loT Central
Answers
Suggested answer: C

Josh has finished scanning a network and has discovered multiple vulnerable services. He knows that several of these usually have protections against external sources but are frequently susceptible to internal users. He decides to draft an email, spoof the sender as the internal IT team, and attach a malicious file disguised as a financial spreadsheet. Before Josh sends the email, he decides to investigate other methods of getting the file onto the system. For this particular attempt, what was the last stage of the cyber kill chain that Josh performed?

A.
Exploitation
A.
Exploitation
Answers
B.
Weaponization
B.
Weaponization
Answers
C.
Delivery
C.
Delivery
Answers
D.
Reconnaissance
D.
Reconnaissance
Answers
Suggested answer: B

An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization's web infrastructure against web-application threats.

Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks. Which of the following security scanners will help John perform the above task?

A.
AlienVault®OSSIM™
A.
AlienVault®OSSIM™
Answers
B.
Syhunt Hybrid
B.
Syhunt Hybrid
Answers
C.
Saleae Logic Analyzer
C.
Saleae Logic Analyzer
Answers
D.
Cisco ASA
D.
Cisco ASA
Answers
Suggested answer: B

Explanation:

Syhunt Hybrid combines comprehensive static and dynamic security scans to detect vulnerabilities like XSS, File Inclusion, SQL Injection, Command Execution and many more, including inferential, in- band and out-of-band attacks through Hybrid-Augmented Analysis (HAST). With Syhunt's unique gray box/hybrid scanning capability the information acquired during source code scans is automatically used to create and enhance dynamic scans. All entry points are covered generating detailed information about the security level of your web applications. Available for on-premises deployment for businesses using Windows and Linux 64-bit.Web Server Security Tools - Web Application Security Scanners The Syhunt Hybrid scanner automates web application security testing and guards the organization's web infrastructure against web application security threats. Syhunt Dynamic crawls websites and detects XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks. (P.1713/1697)

To hide the file on a Linux system, you have to start the filename with a specific character. What is the character?

A.
Exclamation mark (!)
A.
Exclamation mark (!)
Answers
B.
Underscore (_)
B.
Underscore (_)
Answers
C.
Tilde H
C.
Tilde H
Answers
D.
Period (.)
D.
Period (.)
Answers
Suggested answer: D

Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results:

TTL: 64 Window Size: 5840

What is the OS running on the target machine?

A.
Solaris OS
A.
Solaris OS
Answers
B.
Windows OS
B.
Windows OS
Answers
C.
Mac OS
C.
Mac OS
Answers
D.
Linux OS
D.
Linux OS
Answers
Suggested answer: D

Attacker Rony installed a rogue access point within an organization's perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by johnson in the above scenario?

A.
Host-based assessment
A.
Host-based assessment
Answers
B.
Wireless network assessment
B.
Wireless network assessment
Answers
C.
Application assessment
C.
Application assessment
Answers
D.
Distributed assessment
D.
Distributed assessment
Answers
Suggested answer: B

Explanation:

Wireless network assessment determines the vulnerabilities in an organization's wireless networks.

In the past, wireless networks used weak and defective data encryption mechanisms. Now, wireless network standards have evolved, but many networks still use weak and outdated security mechanisms and are open to attack. Wireless network assessments try to attack wireless authentication mechanisms and gain unauthorized access. This type of assessment tests wireless networks and identifies rogue networks that may exist within an organization's perimeter. These assessments audit client-specified sites with a wireless network. They sniff wireless network traffic and try to crack encryption keys. Auditors test other network access if they gain access to the wireless network.

Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiver's public key, and only the receiver can decrypt the message using their private key. What is the security model implemented by Jane to secure corporate messages?

A.
Zero trust network
A.
Zero trust network
Answers
B.
Transport Layer Security (TLS)
B.
Transport Layer Security (TLS)
Answers
C.
Secure Socket Layer (SSL)
C.
Secure Socket Layer (SSL)
Answers
D.
Web of trust (WOT)
D.
Web of trust (WOT)
Answers
Suggested answer: D

While performing an Nmap scan against a host, Paola determines the existence of a firewall. In an attempt to determine whether the firewall is stateful or stateless, which of the following options would be best to use?

A.
-sA
A.
-sA
Answers
B.
-sX
B.
-sX
Answers
C.
-sT
C.
-sT
Answers
D.
-sF
D.
-sF
Answers
Suggested answer: A

Explanation:

-sA (TCP ACK scan) This scan is different than the others discussed so far in that it never determines open (or even open|filtered) ports. It is used to map out firewall rulesets, determining whether they are stateful or not and which ports are filtered.The ACK scan probe packet has only the ACK flag set (unless you use --scanflags).

When scanning unfiltered systems, open and closed ports will both return a RST packet. Nmap then labels them as unfiltered, meaning that they are reachable by the ACK packet, but whether they are open or closed is undetermined. Ports that don't respond, or send certain ICMP error messages back (type 3, code 0, 1, 2, 3, 9, 10, or 13), are labeled filtered.https://nmap.org/book/man-port-scanning-techniques.html

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?

A.
Alice's private key
A.
Alice's private key
Answers
B.
Alice's public key
B.
Alice's public key
Answers
C.
His own private key
C.
His own private key
Answers
D.
His own public key
D.
His own public key
Answers
Suggested answer: B
Total 573 questions
Go to page: of 58