ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 47

Question list
Search
Search

List of questions

Search

Related questions











Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then used to launch which types of attack?

A.
MITM attack
A.
MITM attack
Answers
B.
Birthday attack
B.
Birthday attack
Answers
C.
DDoS attack
C.
DDoS attack
Answers
D.
Password attack
D.
Password attack
Answers
Suggested answer: C

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?

A.
PCI-DSS
A.
PCI-DSS
Answers
B.
FISMA
B.
FISMA
Answers
C.
SOX
C.
SOX
Answers
D.
ISO/I EC 27001:2013
D.
ISO/I EC 27001:2013
Answers
Suggested answer: C

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?

A.
Key derivation function
A.
Key derivation function
Answers
B.
Key reinstallation
B.
Key reinstallation
Answers
C.
A Public key infrastructure
C.
A Public key infrastructure
Answers
D.
Key stretching
D.
Key stretching
Answers
Suggested answer: D

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company.

What is the API vulnerability revealed in the above scenario?

A.
Code injections
A.
Code injections
Answers
B.
Improper use of CORS
B.
Improper use of CORS
Answers
C.
No ABAC validation
C.
No ABAC validation
Answers
D.
Business logic flaws
D.
Business logic flaws
Answers
Suggested answer: C

Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks. What is the type of threat intelligence collected by Arnold in the above scenario?

A.
Strategic threat intelligence
A.
Strategic threat intelligence
Answers
B.
Tactical threat intelligence
B.
Tactical threat intelligence
Answers
C.
Operational threat intelligence
C.
Operational threat intelligence
Answers
D.
Technical threat intelligence
D.
Technical threat intelligence
Answers
Suggested answer: C

Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.

Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication?

A.
WSDL
A.
WSDL
Answers
B.
WS Work Processes
B.
WS Work Processes
Answers
C.
WS-Policy
C.
WS-Policy
Answers
D.
WS-Security
D.
WS-Security
Answers
Suggested answer: D

Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities.

He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that Jake used to infect the target device?

A.
DroidSheep
A.
DroidSheep
Answers
B.
Androrat
B.
Androrat
Answers
C.
Zscaler
C.
Zscaler
Answers
D.
Trident
D.
Trident
Answers
Suggested answer: D

Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands. Which of the following commands was used by Clark to hijack the connections?

A.
btlejack-f 0x129f3244-j
A.
btlejack-f 0x129f3244-j
Answers
B.
btlejack -c any
B.
btlejack -c any
Answers
C.
btlejack -d /dev/ttyACM0 -d /dev/ttyACM2 -s
C.
btlejack -d /dev/ttyACM0 -d /dev/ttyACM2 -s
Answers
D.
btlejack -f 0x9c68fd30 -t -m 0x1 fffffffff
D.
btlejack -f 0x9c68fd30 -t -m 0x1 fffffffff
Answers
Suggested answer: D

Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company's IT infrastructure to thwart DoS/ DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks. What is the countermeasure Mike applied to defend against jamming and scrambling attacks?

A.
Allow the usage of functions such as gets and strcpy
A.
Allow the usage of functions such as gets and strcpy
Answers
B.
Allow the transmission of all types of addressed packets at the ISP level
B.
Allow the transmission of all types of addressed packets at the ISP level
Answers
C.
Implement cognitive radios in the physical layer
C.
Implement cognitive radios in the physical layer
Answers
D.
A Disable TCP SYN cookie protection
D.
A Disable TCP SYN cookie protection
Answers
Suggested answer: C

What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?

A.
The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists.
A.
The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists.
Answers
B.
Reveals the daily outgoing message limits before mailboxes are locked
B.
Reveals the daily outgoing message limits before mailboxes are locked
Answers
C.
The internal command RCPT provides a list of ports open to message traffic.
C.
The internal command RCPT provides a list of ports open to message traffic.
Answers
D.
A list of all mail proxy server addresses used by the targeted host
D.
A list of all mail proxy server addresses used by the targeted host
Answers
Suggested answer: A
Total 573 questions
Go to page: of 58