ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 7

Question list
Search
Search

Related questions











Which of the following is assured by the use of a hash?

A.
Authentication
A.
Authentication
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Availability
C.
Availability
Answers
D.
Integrity
D.
Integrity
Answers
Suggested answer: D

Which results will be returned with the following Google search query? site:target.com – site:Marketing.target.com accounting

A.
Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.
A.
Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.
Answers
B.
Results matching all words in the query.
B.
Results matching all words in the query.
Answers
C.
Results for matches on target.com and Marketing.target.com that include the word "accounting"
C.
Results for matches on target.com and Marketing.target.com that include the word "accounting"
Answers
D.
Results matching "accounting" in domain target.com but not on the site Marketing.target.com
D.
Results matching "accounting" in domain target.com but not on the site Marketing.target.com
Answers
Suggested answer: D

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?

A.
OPPORTUNISTICTLS
A.
OPPORTUNISTICTLS
Answers
B.
UPGRADETLS
B.
UPGRADETLS
Answers
C.
FORCETLS
C.
FORCETLS
Answers
D.
STARTTLS
D.
STARTTLS
Answers
Suggested answer: D

In the field of cryptanalysis, what is meant by a "rubber-hose" attack?

A.
Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.
A.
Forcing the targeted keystream through a hardware-accelerated device such as an ASIC.
Answers
B.
A backdoor placed into a cryptographic algorithm by its creator.
B.
A backdoor placed into a cryptographic algorithm by its creator.
Answers
C.
Extraction of cryptographic secrets through coercion or torture.
C.
Extraction of cryptographic secrets through coercion or torture.
Answers
D.
Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.
D.
Attempting to decrypt ciphertext by making logical assumptions about the contents of the original plaintext.
Answers
Suggested answer: C

Explanation:

A powerful and often the most effective cryptanalysis method in which the attack is directed at the most vulnerable link in the cryptosystem - the person. In this attack, the cryptanalyst uses blackmail, threats, torture, extortion, bribery, etc.

This method's main advantage is the decryption time's fundamental independence from the volume of secret information, the length of the key, and the cipher's mathematical strength.

The method can reduce the time to guess a password, for example, for AES, to an acceptable level; however, it requires special authorization from the relevant regulatory authorities. Therefore, it is outside the scope of this course and is not considered in its practical part.

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort.

You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?

A.
tcp.srcport= = 514 && ip.src= = 192.168.0.99
A.
tcp.srcport= = 514 && ip.src= = 192.168.0.99
Answers
B.
tcp.srcport= = 514 && ip.src= = 192.168.150
B.
tcp.srcport= = 514 && ip.src= = 192.168.150
Answers
C.
tcp.dstport= = 514 && ip.dst= = 192.168.0.99
C.
tcp.dstport= = 514 && ip.dst= = 192.168.0.99
Answers
D.
tcp.dstport= = 514 && ip.dst= = 192.168.0.150
D.
tcp.dstport= = 514 && ip.dst= = 192.168.0.150
Answers
Suggested answer: D

What two conditions must a digital signature meet?

A.
Has to be the same number of characters as a physical signature and must be unique.
A.
Has to be the same number of characters as a physical signature and must be unique.
Answers
B.
Has to be unforgeable, and has to be authentic.
B.
Has to be unforgeable, and has to be authentic.
Answers
C.
Must be unique and have special characters.
C.
Must be unique and have special characters.
Answers
D.
Has to be legible and neat.
D.
Has to be legible and neat.
Answers
Suggested answer: B

A company's security policy states that all Web browsers must automatically delete their HTTPbrowser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?

A.
Attempts by attackers to access the user and password information stored in the company's SQL database.
A.
Attempts by attackers to access the user and password information stored in the company's SQL database.
Answers
B.
Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.
B.
Attempts by attackers to access Web sites that trust the Web browser user by stealing the user's authentication credentials.
Answers
C.
Attempts by attackers to access password stored on the user's computer without the user's knowledge.
C.
Attempts by attackers to access password stored on the user's computer without the user's knowledge.
Answers
D.
Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.
D.
Attempts by attackers to determine the user's Web browser usage patterns, including when sites were visited and for how long.
Answers
Suggested answer: B

What is correct about digital signatures?

A.
A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.
A.
A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.
Answers
B.
Digital signatures may be used in different documents of the same type.
B.
Digital signatures may be used in different documents of the same type.
Answers
C.
A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.
C.
A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.
Answers
D.
Digital signatures are issued once for each user and can be used everywhere until they expire.
D.
Digital signatures are issued once for each user and can be used everywhere until they expire.
Answers
Suggested answer: A

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

A.
He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
A.
He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
Answers
B.
He will activate OSPF on the spoofed root bridge.
B.
He will activate OSPF on the spoofed root bridge.
Answers
C.
He will repeat this action so that it escalates to a DoS attack.
C.
He will repeat this action so that it escalates to a DoS attack.
Answers
D.
He will repeat the same attack against all L2 switches of the network.
D.
He will repeat the same attack against all L2 switches of the network.
Answers
Suggested answer: A

You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive.

When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user's password or activate disabled Windows accounts?

A.
John the Ripper
A.
John the Ripper
Answers
B.
SET
B.
SET
Answers
C.
CHNTPW
C.
CHNTPW
Answers
D.
Cain & Abel
D.
Cain & Abel
Answers
Suggested answer: C
Total 573 questions
Go to page: of 58