ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 25

Question list
Search
Search

Related questions











In terms of supporting a forensic investigation, it is now imperative that managers, first-responders, etc., accomplish the following actions to the computer under investigation:

A.
Secure the area and shut-down the computer until investigators arrive
A.
Secure the area and shut-down the computer until investigators arrive
Answers
B.
Secure the area and attempt to maintain power until investigators arrive
B.
Secure the area and attempt to maintain power until investigators arrive
Answers
C.
Immediately place hard drive and other components in an anti-static bag
C.
Immediately place hard drive and other components in an anti-static bag
Answers
D.
Secure the area.
D.
Secure the area.
Answers
Suggested answer: B

What is the term describing the act of inspecting all real-time Internet traffic (i.e., packets) traversing a major Internet backbone without introducing any apparent latency?

A.
Traffic Analysis
A.
Traffic Analysis
Answers
B.
Deep-Packet inspection
B.
Deep-Packet inspection
Answers
C.
Packet sampling
C.
Packet sampling
Answers
D.
Heuristic analysis
D.
Heuristic analysis
Answers
Suggested answer: B

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

A.
Trusted and untrusted networks
A.
Trusted and untrusted networks
Answers
B.
Type of authentication
B.
Type of authentication
Answers
C.
Storage encryption
C.
Storage encryption
Answers
D.
Log retention
D.
Log retention
Answers
Suggested answer: A

Which of the following is the MAIN security concern for public cloud computing?

A.
Unable to control physical access to the servers
A.
Unable to control physical access to the servers
Answers
B.
Unable to track log on activity
B.
Unable to track log on activity
Answers
C.
Unable to run anti-virus scans
C.
Unable to run anti-virus scans
Answers
D.
Unable to patch systems as needed
D.
Unable to patch systems as needed
Answers
Suggested answer: A

The process of identifying and classifying assets is typically included in the

A.
Threat analysis process
A.
Threat analysis process
Answers
B.
Asset configuration management process
B.
Asset configuration management process
Answers
C.
Business Impact Analysis
C.
Business Impact Analysis
Answers
D.
Disaster Recovery plan
D.
Disaster Recovery plan
Answers
Suggested answer: B

Which of the following is a symmetric encryption algorithm?

A.
3DES
A.
3DES
Answers
B.
MD5
B.
MD5
Answers
C.
ECC
C.
ECC
Answers
D.
RSA
D.
RSA
Answers
Suggested answer: A

You are having a penetration test done on your company network and the leader of the team says they discovered all the network devices because no one had changed the Simple Network Management Protocol (SNMP) community strings from the defaults. Which of the following is a default community string?

A.
Execute
A.
Execute
Answers
B.
Read
B.
Read
Answers
C.
Administrator
C.
Administrator
Answers
D.
Public
D.
Public
Answers
Suggested answer: D

As a CISO you need to understand the steps that are used to perform an attack against a network. Put each step into the correct order.

A.
Covering tracks
A.
Covering tracks
Answers
B.
Scanning and enumeration
B.
Scanning and enumeration
Answers
C.
Maintaining Access
C.
Maintaining Access
Answers
D.
Reconnaissance
D.
Reconnaissance
Answers
E.
Gaining Access
E.
Gaining Access
Answers
F.
4, 2, 5, 3, 1
F.
4, 2, 5, 3, 1
Answers
G.
2, 5, 3, 1, 4
G.
2, 5, 3, 1, 4
Answers
H.
4, 5, 2, 3, 1
H.
4, 5, 2, 3, 1
Answers
I.
4, 3, 5, 2, 1
I.
4, 3, 5, 2, 1
Answers
Suggested answer: A

What type of attack requires the least amount of technical equipment and has the highest success rate?

A.
War driving
A.
War driving
Answers
B.
Operating system attacks
B.
Operating system attacks
Answers
C.
Social engineering
C.
Social engineering
Answers
D.
Shrink wrap attack
D.
Shrink wrap attack
Answers
Suggested answer: C

Physical security measures typically include which of the following components?

A.
Physical, Technical, Operational
A.
Physical, Technical, Operational
Answers
B.
Technical, Strong Password, Operational
B.
Technical, Strong Password, Operational
Answers
C.
Operational, Biometric, Physical
C.
Operational, Biometric, Physical
Answers
D.
Strong password, Biometric, Common Access Card
D.
Strong password, Biometric, Common Access Card
Answers
Suggested answer: A
Total 460 questions
Go to page: of 46