ECCouncil 312-50v12 Practice Test - Questions Answers, Page 7
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 61
 
                            
                            
                                Which of the following is assured by the use of a hash?
Question 62
 
                            
                            
                                Which results will be returned with the following Google search query? site:target.com β site:Marketing.target.com accounting
Question 63
 
                            
                            
                                Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?
Question 64
 
                            
                            
                                In the field of cryptanalysis, what is meant by a "rubber-hose" attack?
A powerful and often the most effective cryptanalysis method in which the attack is directed at the most vulnerable link in the cryptosystem - the person. In this attack, the cryptanalyst uses blackmail, threats, torture, extortion, bribery, etc.
This method's main advantage is the decryption time's fundamental independence from the volume of secret information, the length of the key, and the cipher's mathematical strength.
The method can reduce the time to guess a password, for example, for AES, to an acceptable level; however, it requires special authorization from the relevant regulatory authorities. Therefore, it is outside the scope of this course and is not considered in its practical part.
Question 65
 
                            
                            
                                You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine (192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort.
You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What Wireshark filter will show the connections from the snort machine to kiwi syslog machine?
Question 66
 
                            
                            
                                What two conditions must a digital signature meet?
Question 67
 
                            
                            
                                A company's security policy states that all Web browsers must automatically delete their HTTPbrowser cookies upon terminating. What sort of security breach is this policy attempting to mitigate?
Question 68
 
                            
                            
                                What is correct about digital signatures?
Question 69
 
                            
                            
                                An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
Question 70
 
                            
                            
                                You have gained physical access to a Windows 2008 R2 server which has an accessible disc drive.
When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user's password or activate disabled Windows accounts?
 
        


 
  
                                            
Question