ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

A.
Man-in-the-middle attack
A.
Man-in-the-middle attack
Answers
B.
Meet-in-the-middle attack
B.
Meet-in-the-middle attack
Answers
C.
Replay attack
C.
Replay attack
Answers
D.
Traffic analysis attack
D.
Traffic analysis attack
Answers
Suggested answer: B

Explanation:

https://en.wikipedia.org/wiki/Meet-in-the-middle_attack The meet-in-the-middle attack (MITM), a known plaintext attack, is a generic space–time tradeoff cryptographic attack against encryption schemes that rely on performing multiple encryption operations in sequence. The MITM attack is the primary reason why Double DES is not used and why a Triple DES key (168-bit) can be bruteforced by an attacker with 256 space and 2112 operations.

The intruder has to know some parts of plaintext and their ciphertexts. Using meet-in-the-middle attacks it is possible to break ciphers, which have two or more secret keys for multiple encryption using the same algorithm. For example, the 3DES cipher works in this way. Meet-in-the-middle attack was first presented by Diffie and Hellman for cryptanalysis of DES algorithm.

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

A camera captures people walking and identifies the individuals using Steve's approach.

After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

A.
Although the approach has two phases, it actually implements just one authentication factor
A.
Although the approach has two phases, it actually implements just one authentication factor
Answers
B.
The solution implements the two authentication factors: physical object and physical characteristic
B.
The solution implements the two authentication factors: physical object and physical characteristic
Answers
C.
The solution will have a high level of false positives
C.
The solution will have a high level of false positives
Answers
D.
Biological motion cannot be used to identify people
D.
Biological motion cannot be used to identify people
Answers
Suggested answer: B

What is not a PCI compliance recommendation?

A.
Use a firewall between the public network and the payment card data.
A.
Use a firewall between the public network and the payment card data.
Answers
B.
Use encryption to protect all transmission of card holder data over any public network.
B.
Use encryption to protect all transmission of card holder data over any public network.
Answers
C.
Rotate employees handling credit card transactions on a yearly basis to different departments.
C.
Rotate employees handling credit card transactions on a yearly basis to different departments.
Answers
D.
Limit access to card holder data to as few individuals as possible.
D.
Limit access to card holder data to as few individuals as possible.
Answers
Suggested answer: C

Explanation:

https://www.pcisecuritystandards.org/pci_security/maintaining_payment_security Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect cardholder data.

2. Do not use vendor-supplied defaults for system passwords and other security parameters.

Protect Cardholder Data

3. Protect stored cardholder data.

4. Encrypt transmission of cardholder data across open, public networks.

Maintain a Vulnerability Management Program

5. Use and regularly update anti-virus software or programs.

6. Develop and maintain secure systems and applications.

Implement Strong Access Control Measures

7. Restrict access to cardholder data by business need-to-know.

8. Assign a unique ID to each person with computer access.

9. Restrict physical access to cardholder data.

Regularly Monitor and Test Networks

10. Track and monitor all access to network resources and cardholder data.

11. Regularly test security systems and processes.

Maintain an Information Security Policy

12. Maintain a policy that addresses information security for employees and contractors.

What is the minimum number of network connections in a multihomed firewall?

A.
3
A.
3
Answers
B.
5
B.
5
Answers
C.
4
C.
4
Answers
D.
2
D.
2
Answers
Suggested answer: A

Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has decreased to 10%. The risk threshold for the application is 20%. Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?

A.
Accept the risk
A.
Accept the risk
Answers
B.
Introduce more controls to bring risk to 0%
B.
Introduce more controls to bring risk to 0%
Answers
C.
Mitigate the risk
C.
Mitigate the risk
Answers
D.
Avoid the risk
D.
Avoid the risk
Answers
Suggested answer: A

Explanation:

Risk Mitigation Risk mitigation can be defined as taking steps to reduce adverse effects. There are four types of risk mitigation strategies that hold unique to Business Continuity and Disaster Recovery. When mitigating risk, it's important to develop a strategy that closely relates to and matches your company's profile.

Risk Acceptance Risk acceptance does not reduce any effects; however, it is still considered a strategy. This strategy is a common option when the cost of other risk management options such as avoidance or limitation may outweigh the cost of the risk itself. A company that doesn't want to spend a lot of money on avoiding risks that do not have a high possibility of occurring will use the risk acceptance strategy.

Risk Avoidance Risk avoidance is the opposite of risk acceptance. It is the action that avoids any exposure to the risk whatsoever. It's important to note that risk avoidance is usually the most expensive of all risk mitigation options.

Risk Limitation Risk limitation is the most common risk management strategy used by businesses. This strategy limits a company's exposure by taking some action. It is a strategy employing a bit of risk acceptance and a bit of risk avoidance or an average of both. An example of risk limitation would be a company accepting that a disk drive may fail and avoiding a long period of failure by having backups.

Risk Transference Risk transference is the involvement of handing risk off to a willing third party. For example, numerous companies outsource certain operations such as customer service, payroll services, etc.

This can be beneficial for a company if a transferred risk is not a core competency of that company. It can also be used so a company can focus more on its core competencies.

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

A.
All three servers need to be placed internally
A.
All three servers need to be placed internally
Answers
B.
A web server facing the Internet, an application server on the internal network, a database server on the internal network
B.
A web server facing the Internet, an application server on the internal network, a database server on the internal network
Answers
C.
A web server and the database server facing the Internet, an application server on the internal network
C.
A web server and the database server facing the Internet, an application server on the internal network
Answers
D.
All three servers need to face the Internet so that they can communicate between themselves
D.
All three servers need to face the Internet so that they can communicate between themselves
Answers
Suggested answer: B

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.

When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

A.
Wireshark
A.
Wireshark
Answers
B.
Ettercap
B.
Ettercap
Answers
C.
Aircrack-ng
C.
Aircrack-ng
Answers
D.
Tcpdump
D.
Tcpdump
Answers
Suggested answer: B

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

A.
ESP transport mode
A.
ESP transport mode
Answers
B.
ESP confidential
B.
ESP confidential
Answers
C.
AH permiscuous
C.
AH permiscuous
Answers
D.
AH Tunnel mode
D.
AH Tunnel mode
Answers
Suggested answer: A

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

A.
Exploration
A.
Exploration
Answers
B.
Investigation
B.
Investigation
Answers
C.
Reconnaissance
C.
Reconnaissance
Answers
D.
Enumeration
D.
Enumeration
Answers
Suggested answer: C

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

A.
Macro virus
A.
Macro virus
Answers
B.
Stealth/Tunneling virus
B.
Stealth/Tunneling virus
Answers
C.
Cavity virus
C.
Cavity virus
Answers
D.
Polymorphic virus
D.
Polymorphic virus
Answers
Suggested answer: B
Total 573 questions
Go to page: of 58