ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 48

List of questions

Question 471

Report Export Collapse

Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens. Which of the following tools is used by Gregory in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 472

Report Export Collapse

When considering how an attacker may exploit a web server, what is web server footprinting?

Become a Premium Member for full access
  Unlock Premium Member

Question 473

Report Export Collapse

Which of the following tactics uses malicious code to redirect users' web traffic?

Become a Premium Member for full access
  Unlock Premium Member

Question 474

Report Export Collapse

Attacker Simon targeted the communication network of an organization and disabled the security controls of NetNTLMvl by modifying the values of LMCompatibilityLevel, NTLMMinClientSec, and RestrictSendingNTLMTraffic. He then extracted all the non-network logon tokens from all the active processes to masquerade as a legitimate user to launch further attacks. What is the type of attack performed by Simon?

Become a Premium Member for full access
  Unlock Premium Member

Question 475

Report Export Collapse

Calvin, a grey-hat hacker, targets a web application that has design flaws in its authentication mechanism. He enumerates usernames from the login form of the web application, which requests users to feed data and specifies the incorrect field in case of invalid credentials. Later, Calvin uses this information to perform social engineering.

Which of the following design flaws in the authentication mechanism is exploited by Calvin?

Become a Premium Member for full access
  Unlock Premium Member

Question 476

Report Export Collapse

Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization's user. What is the enumeration technique used by Henry on the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 477

Report Export Collapse

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters.

If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.

What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 478

Report Export Collapse

Mary, a penetration tester, has found password hashes in a client system she managed to breach.

She needs to use these passwords to continue with the test, but she does not have time to find the passwords that correspond to these hashes. Which type of attack can she implement in order to continue?

Become a Premium Member for full access
  Unlock Premium Member

Question 479

Report Export Collapse

Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit.

What is the technique used byjack to launch the fileless malware on the target systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 480

Report Export Collapse

In an attempt to damage the reputation of a competitor organization, Hailey, a professional hacker, gathers a list of employee and client email addresses and other related information by using various search engines, social networking sites, and web spidering tools. In this process, she also uses an automated tool to gather a list of words from the target website to further perform a brute-force attack on the previously gathered email addresses.

What is the tool used by Hailey for gathering a list of words from the target website?

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions