ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 47

List of questions

Question 461

Report Export Collapse

Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then used to launch which types of attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 462

Report Export Collapse

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?

Become a Premium Member for full access
  Unlock Premium Member

Question 463

Report Export Collapse

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?

Become a Premium Member for full access
  Unlock Premium Member

Question 464

Report Export Collapse

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company.

What is the API vulnerability revealed in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 465

Report Export Collapse

Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks. What is the type of threat intelligence collected by Arnold in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 466

Report Export Collapse

Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.

Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication?

Become a Premium Member for full access
  Unlock Premium Member

Question 467

Report Export Collapse

Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities.

He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that Jake used to infect the target device?

Become a Premium Member for full access
  Unlock Premium Member

Question 468

Report Export Collapse

Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands. Which of the following commands was used by Clark to hijack the connections?

Become a Premium Member for full access
  Unlock Premium Member

Question 469

Report Export Collapse

Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company's IT infrastructure to thwart DoS/ DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks. What is the countermeasure Mike applied to defend against jamming and scrambling attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 470

Report Export Collapse

What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions