ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 50

List of questions

Question 491

Report Export Collapse

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.

What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

Become a Premium Member for full access
  Unlock Premium Member

Question 492

Report Export Collapse

Which rootkit is characterized by its function of adding code and/or replacing some of the operatingsystem kernel code to obscure a backdoor on a system?

Become a Premium Member for full access
  Unlock Premium Member

Question 493

Report Export Collapse

Which of the following Metasploit post-exploitation modules can be used to escalate privileges on Windows systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 494

Report Export Collapse

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device.

In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.

Which of the following types of fault injection attack is performed by Robert in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 495

Report Export Collapse

Jude, a pen tester working in Keiltech Ltd., performs sophisticated security testing on his company's network infrastructure to identify security loopholes. In this process, he started to circumvent the network protection tools and firewalls used in the company. He employed a technique that can create forged TCP sessions by carrying out multiple SYN, ACK, and RST or FIN packets. Further, this process allowed Jude to execute DDoS attacks that can exhaust the network resources. What is the attack technique used by Jude for finding loopholes in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 496

Report Export Collapse

Upon establishing his new startup, Tom hired a cloud service provider (CSP) but was dissatisfied with their service and wanted to move to another CSP.

What part of the contract might prevent him from doing so?

Become a Premium Member for full access
  Unlock Premium Member

Question 497

Report Export Collapse

Alex, a cloud security engineer working in Eyecloud Inc. is tasked with isolating applications from the underlying infrastructure and stimulating communication via well-defined channels. For this purpose, he used an open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level visualization, delivers containerized software packages, and promotes fast software delivery. What is the cloud technology employed by Alex in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 498

Report Export Collapse

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 499

Report Export Collapse

Which type of attack attempts to overflow the content-addressable memory (CAM) table in an Ethernet switch?

Become a Premium Member for full access
  Unlock Premium Member

Question 500

Report Export Collapse

What is the following command used for? sqlmap.py-u ,,http://10.10.1.20/?p=1&forumaction=search" -dbs

Become a Premium Member for full access
  Unlock Premium Member
Total 573 questions
Go to page: of 58
Search

Related questions