ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 50

Question list
Search
Search

List of questions

Search

Related questions











Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.

What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

A.
Reverse engineering
A.
Reverse engineering
Answers
B.
App sandboxing
B.
App sandboxing
Answers
C.
Jailbreaking
C.
Jailbreaking
Answers
D.
Social engineering
D.
Social engineering
Answers
Suggested answer: A

Which rootkit is characterized by its function of adding code and/or replacing some of the operatingsystem kernel code to obscure a backdoor on a system?

A.
User-mode rootkit
A.
User-mode rootkit
Answers
B.
Library-level rootkit
B.
Library-level rootkit
Answers
C.
Kernel-level rootkit
C.
Kernel-level rootkit
Answers
D.
Hypervisor-level rootkit
D.
Hypervisor-level rootkit
Answers
Suggested answer: C

Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?

A.
getsystem
A.
getsystem
Answers
B.
getuid
B.
getuid
Answers
C.
keylogrecorder
C.
keylogrecorder
Answers
D.
autoroute
D.
autoroute
Answers
Suggested answer: A

Explanation:

When using exploits, you might gain access as only a local user. This limits what you can do on the target machine. You can use Meterpreters 'getsystem` command (https://github.com/rapid7/metasploit- payloads/blob/master/c/meterpreter/ source/extensions/priv/elevate.c#L70) to elevate your permissions from a local administrator to SYSTEM. This works by using three elevation techniques.

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device.

In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.

Which of the following types of fault injection attack is performed by Robert in the above scenario?

A.
Frequency/voltage tampering
A.
Frequency/voltage tampering
Answers
B.
Optical, electromagnetic fault injection (EMFI)
B.
Optical, electromagnetic fault injection (EMFI)
Answers
C.
Temperature attack
C.
Temperature attack
Answers
D.
Power/clock/reset glitching
D.
Power/clock/reset glitching
Answers
Suggested answer: D

Explanation:

These types of attacks occur when faults or glitches are INJECTED into the Power supply that can be used for remote execution.

Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes in the above scenario?

A.
UDP flood attack
A.
UDP flood attack
Answers
B.
Ping-of-death attack
B.
Ping-of-death attack
Answers
C.
Spoofed session flood attack
C.
Spoofed session flood attack
Answers
D.
Peer-to-peer attack
D.
Peer-to-peer attack
Answers
Suggested answer: C

Explanation:

In order to circumvent network protection tools, cybercriminals may forge a TCP session more efficiently by submitting a bogus SYN packet, a series of ACK packets, and at least one RST (reset) or FIN (connection termination) packet. This tactic allows crooks to get around defenses that only keep tabs on incoming traffic rather than analyzing return traffic.

Upon establishing his new startup, Tom hired a cloud service provider (CSP) but was dissatisfied with their service and wanted to move to another CSP.

What part of the contract might prevent him from doing so?

A.
Virtualization
A.
Virtualization
Answers
B.
Lock-in
B.
Lock-in
Answers
C.
Lock-down
C.
Lock-down
Answers
D.
Lock-up
D.
Lock-up
Answers
Suggested answer: B

Explanation:

Lock-in reflects the inability of the client to migrate from one CSP to another or in-house systems owing to the lack of tools, procedures, standard data formats, applications, and service portability.This threat is related to the inappropriate selection of a CSP, incomplete and non-transparent terms of use, lack of standard mechanisms, etc. (P.2884/2868)

Alex, a cloud security engineer working in Eyecloud Inc. is tasked with isolating applications from the underlying infrastructure and stimulating communication via well-defined channels. For this purpose, he used an open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level visualization, delivers containerized software packages, and promotes fast software delivery. What is the cloud technology employed by Alex in the above scenario?

A.
Virtual machine
A.
Virtual machine
Answers
B.
Serverless computing
B.
Serverless computing
Answers
C.
Docker
C.
Docker
Answers
D.
Zero trust network
D.
Zero trust network
Answers
Suggested answer: C

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

A.
Output encoding
A.
Output encoding
Answers
B.
Enforce least privileges
B.
Enforce least privileges
Answers
C.
Whitelist validation
C.
Whitelist validation
Answers
D.
Blacklist validation
D.
Blacklist validation
Answers
Suggested answer: C

Explanation:

Defenses in the Application - Input Validation Whitelist Validation, Whitelist validation is a best practice whereby only the list of entities (i.e., data type, range, size, value, etc.) that have been approved for secured access is accepted.

Whitelist validation can also be termed as positive validation or inclusion. (P.2164/2148)

Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?

A.
Evil twin attack
A.
Evil twin attack
Answers
B.
DNS cache flooding
B.
DNS cache flooding
Answers
C.
MAC flooding
C.
MAC flooding
Answers
D.
DDoS attack
D.
DDoS attack
Answers
Suggested answer: C

What is the following command used for? sqlmap.py-u ,,http://10.10.1.20/?p=1&forumaction=search" -dbs

A.
Creating backdoors using SQL injection
A.
Creating backdoors using SQL injection
Answers
B.
A Enumerating the databases in the DBMS for the URL
B.
A Enumerating the databases in the DBMS for the URL
Answers
C.
Retrieving SQL statements being executed on the database
C.
Retrieving SQL statements being executed on the database
Answers
D.
Searching database statements at the IP address given
D.
Searching database statements at the IP address given
Answers
Suggested answer: B
Total 573 questions
Go to page: of 58