ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 8

Add to Whishlist

List of questions

Question 71

Report Export Collapse

What does a firewall check to prevent particular ports and applications from getting packets into an organization?

Transport layer port numbers and application layer headers
Transport layer port numbers and application layer headers
Presentation layer headers and the session layer port numbers
Presentation layer headers and the session layer port numbers
Network layer headers and the session layer port numbers
Network layer headers and the session layer port numbers
Application layer port numbers and the transport layer headers
Application layer port numbers and the transport layer headers
Suggested answer: A
asked 18/09/2024
Nicklas Magnusson
44 questions

Question 72

Report Export Collapse

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.

Which file does the attacker need to modify?

Boot.ini
Boot.ini
Sudoers
Sudoers
Networks
Networks
Hosts
Hosts
Suggested answer: D
asked 18/09/2024
Tyler Andringa
40 questions

Question 73

Report Export Collapse

is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.

DNSSEC
DNSSEC
Resource records
Resource records
Resource transfer
Resource transfer
Zone transfer
Zone transfer
Suggested answer: A
Explanation:

The Domain Name System Security Extensions (DNSSEC) is a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by DNS for use on IP networks. DNSSEC is a set of extensions to DNS provide to DNS clients (resolvers) origin authentication of DNS data, authenticated denial of existence, and data integrity, but not availability or confidentiality. DNSSEC is necessary because the original DNS design did not include security but was designed to be a scalable distributed system. DNSSEC adds security while maintaining backward compatibility.

asked 18/09/2024
Marc Casin Martinez
43 questions

Question 74

Report Export Collapse

Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

Preparation phase
Preparation phase
Containment phase
Containment phase
Identification phase
Identification phase
Recovery phase
Recovery phase
Suggested answer: A
asked 18/09/2024
bert toger
45 questions

Question 75

Report Export Collapse

The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described?

Multi-cast mode
Multi-cast mode
Promiscuous mode
Promiscuous mode
WEM
WEM
Port forwarding
Port forwarding
Suggested answer: B
asked 18/09/2024
Arkadiusz Skopinski
47 questions

Question 76

Report Export Collapse

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.

What is the best security policy concerning this setup?

Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.
Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.
As long as the physical access to the network elements is restricted, there is no need for additional measures.
As long as the physical access to the network elements is restricted, there is no need for additional measures.
There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.
There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.
The operator knows that attacks and down time are inevitable and should have a backup site.
The operator knows that attacks and down time are inevitable and should have a backup site.
Suggested answer: A
asked 18/09/2024
Sergio Pena Ochoa
44 questions

Question 77

Report Export Collapse

PGP, SSL, and IKE are all examples of which type of cryptography?

Digest
Digest
Secret Key
Secret Key
Public Key
Public Key
Hash Algorithm
Hash Algorithm
Suggested answer: C
asked 18/09/2024
Emanuel Sifuentes
51 questions

Question 78

Report Export Collapse

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?

Scanning
Scanning
Footprinting
Footprinting
Enumeration
Enumeration
System Hacking
System Hacking
Suggested answer: B
asked 18/09/2024
Olugbenga Fagbohun
47 questions

Question 79

Report Export Collapse

A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer's software and hardware without the owner's permission. Their intention can either be to simply gain knowledge or to illegally make changes.

Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

White Hat
White Hat
Suicide Hacker
Suicide Hacker
Gray Hat
Gray Hat
Black Hat
Black Hat
Suggested answer: C
asked 18/09/2024
Luigi Trigilio
47 questions

Question 80

Report Export Collapse

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.

What is this type of DNS configuration commonly called?

DynDNS
DynDNS
DNS Scheme
DNS Scheme
DNSSEC
DNSSEC
Split DNS
Split DNS
Suggested answer: D
asked 18/09/2024
Ryan Edwards
45 questions
Total 573 questions
Go to page: of 58
Search

Related questions