ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report Export Collapse

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?

Man-in-the-middle attack
Man-in-the-middle attack
Meet-in-the-middle attack
Meet-in-the-middle attack
Replay attack
Replay attack
Traffic analysis attack
Traffic analysis attack
Suggested answer: B
Explanation:

https://en.wikipedia.org/wiki/Meet-in-the-middle_attack The meet-in-the-middle attack (MITM), a known plaintext attack, is a generic space–time tradeoff cryptographic attack against encryption schemes that rely on performing multiple encryption operations in sequence. The MITM attack is the primary reason why Double DES is not used and why a Triple DES key (168-bit) can be bruteforced by an attacker with 256 space and 2112 operations.

The intruder has to know some parts of plaintext and their ciphertexts. Using meet-in-the-middle attacks it is possible to break ciphers, which have two or more secret keys for multiple encryption using the same algorithm. For example, the 3DES cipher works in this way. Meet-in-the-middle attack was first presented by Diffie and Hellman for cryptanalysis of DES algorithm.

asked 18/09/2024
Mk Cheng
50 questions

Question 42

Report Export Collapse

Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access.

A camera captures people walking and identifies the individuals using Steve's approach.

After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

Although the approach has two phases, it actually implements just one authentication factor
Although the approach has two phases, it actually implements just one authentication factor
The solution implements the two authentication factors: physical object and physical characteristic
The solution implements the two authentication factors: physical object and physical characteristic
The solution will have a high level of false positives
The solution will have a high level of false positives
Biological motion cannot be used to identify people
Biological motion cannot be used to identify people
Suggested answer: B
asked 18/09/2024
Paula Delgado
40 questions

Question 43

Report Export Collapse

What is not a PCI compliance recommendation?

Use a firewall between the public network and the payment card data.
Use a firewall between the public network and the payment card data.
Use encryption to protect all transmission of card holder data over any public network.
Use encryption to protect all transmission of card holder data over any public network.
Rotate employees handling credit card transactions on a yearly basis to different departments.
Rotate employees handling credit card transactions on a yearly basis to different departments.
Limit access to card holder data to as few individuals as possible.
Limit access to card holder data to as few individuals as possible.
Suggested answer: C
Explanation:

https://www.pcisecuritystandards.org/pci_security/maintaining_payment_security Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect cardholder data.

2. Do not use vendor-supplied defaults for system passwords and other security parameters.

Protect Cardholder Data

3. Protect stored cardholder data.

4. Encrypt transmission of cardholder data across open, public networks.

Maintain a Vulnerability Management Program

5. Use and regularly update anti-virus software or programs.

6. Develop and maintain secure systems and applications.

Implement Strong Access Control Measures

7. Restrict access to cardholder data by business need-to-know.

8. Assign a unique ID to each person with computer access.

9. Restrict physical access to cardholder data.

Regularly Monitor and Test Networks

10. Track and monitor all access to network resources and cardholder data.

11. Regularly test security systems and processes.

Maintain an Information Security Policy

12. Maintain a policy that addresses information security for employees and contractors.

asked 18/09/2024
Elias Lopez III
51 questions

Question 44

Report Export Collapse

What is the minimum number of network connections in a multihomed firewall?

3
3
5
5
4
4
2
2
Suggested answer: A
asked 18/09/2024
maddalena barbaro
37 questions

Question 45

Report Export Collapse

Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has decreased to 10%. The risk threshold for the application is 20%. Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?

Accept the risk
Accept the risk
Introduce more controls to bring risk to 0%
Introduce more controls to bring risk to 0%
Mitigate the risk
Mitigate the risk
Avoid the risk
Avoid the risk
Suggested answer: A
Explanation:

Risk Mitigation Risk mitigation can be defined as taking steps to reduce adverse effects. There are four types of risk mitigation strategies that hold unique to Business Continuity and Disaster Recovery. When mitigating risk, it's important to develop a strategy that closely relates to and matches your company's profile.

ECCouncil 312-50v12 image Question 45 explanation 24775 09182024185521000000

Risk Acceptance Risk acceptance does not reduce any effects; however, it is still considered a strategy. This strategy is a common option when the cost of other risk management options such as avoidance or limitation may outweigh the cost of the risk itself. A company that doesn't want to spend a lot of money on avoiding risks that do not have a high possibility of occurring will use the risk acceptance strategy.

Risk Avoidance Risk avoidance is the opposite of risk acceptance. It is the action that avoids any exposure to the risk whatsoever. It's important to note that risk avoidance is usually the most expensive of all risk mitigation options.

Risk Limitation Risk limitation is the most common risk management strategy used by businesses. This strategy limits a company's exposure by taking some action. It is a strategy employing a bit of risk acceptance and a bit of risk avoidance or an average of both. An example of risk limitation would be a company accepting that a disk drive may fail and avoiding a long period of failure by having backups.

Risk Transference Risk transference is the involvement of handing risk off to a willing third party. For example, numerous companies outsource certain operations such as customer service, payroll services, etc.

This can be beneficial for a company if a transferred risk is not a core competency of that company. It can also be used so a company can focus more on its core competencies.

asked 18/09/2024
Daniel Calleja
38 questions

Question 46

Report Export Collapse

You need to deploy a new web-based software package for your organization. The package requires three separate servers and needs to be available on the Internet. What is the recommended architecture in terms of server placement?

All three servers need to be placed internally
All three servers need to be placed internally
A web server facing the Internet, an application server on the internal network, a database server on the internal network
A web server facing the Internet, an application server on the internal network, a database server on the internal network
A web server and the database server facing the Internet, an application server on the internal network
A web server and the database server facing the Internet, an application server on the internal network
All three servers need to face the Internet so that they can communicate between themselves
All three servers need to face the Internet so that they can communicate between themselves
Suggested answer: B
asked 18/09/2024
bijay ghimire
43 questions

Question 47

Report Export Collapse

An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.

When users accessed any page, the applet ran and exploited many machines. Which one of the following tools the hacker probably used to inject HTML code?

Wireshark
Wireshark
Ettercap
Ettercap
Aircrack-ng
Aircrack-ng
Tcpdump
Tcpdump
Suggested answer: B
asked 18/09/2024
Sairam Emmidishetti
43 questions

Question 48

Report Export Collapse

Which mode of IPSec should you use to assure security and confidentiality of data within the same LAN?

ESP transport mode
ESP transport mode
ESP confidential
ESP confidential
AH permiscuous
AH permiscuous
AH Tunnel mode
AH Tunnel mode
Suggested answer: A
asked 18/09/2024
Albert Terrell
40 questions

Question 49

Report Export Collapse

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

Exploration
Exploration
Investigation
Investigation
Reconnaissance
Reconnaissance
Enumeration
Enumeration
Suggested answer: C
asked 18/09/2024
Luis Maciel
49 questions

Question 50

Report Export Collapse

Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

Macro virus
Macro virus
Stealth/Tunneling virus
Stealth/Tunneling virus
Cavity virus
Cavity virus
Polymorphic virus
Polymorphic virus
Suggested answer: B
asked 18/09/2024
Francesco Balducci
40 questions
Total 573 questions
Go to page: of 58
Search

Related questions