ExamGecko
Home Home / ECCouncil / 712-50

ECCouncil 712-50 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:

A.
' o 1=1 - -
A.
' o 1=1 - -
Answers
B.
/../../../../
B.
/../../../../
Answers
C.
"DROPTABLE USERNAME"
C.
"DROPTABLE USERNAME"
Answers
D.
NOPS
D.
NOPS
Answers
Suggested answer: A

An anonymity network is a series of?

A.
Covert government networks
A.
Covert government networks
Answers
B.
War driving maps
B.
War driving maps
Answers
C.
Government networks in Tora
C.
Government networks in Tora
Answers
D.
Virtual network tunnels
D.
Virtual network tunnels
Answers
Suggested answer: D

An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?

A.
Shared key
A.
Shared key
Answers
B.
Asynchronous
B.
Asynchronous
Answers
C.
Open
C.
Open
Answers
D.
None
D.
None
Answers
Suggested answer: A

Which wireless encryption technology makes use of temporal keys?

A.
Wireless Application Protocol (WAP)
A.
Wireless Application Protocol (WAP)
Answers
B.
Wifi Protected Access version 2 (WPA2)
B.
Wifi Protected Access version 2 (WPA2)
Answers
C.
Wireless Equivalence Protocol (WEP)
C.
Wireless Equivalence Protocol (WEP)
Answers
D.
Extensible Authentication Protocol (EAP)
D.
Extensible Authentication Protocol (EAP)
Answers
Suggested answer: B

Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?

A.
In-line hardware keyloggers don't require physical access
A.
In-line hardware keyloggers don't require physical access
Answers
B.
In-line hardware keyloggers don't comply to industry regulations
B.
In-line hardware keyloggers don't comply to industry regulations
Answers
C.
In-line hardware keyloggers are undetectable by software
C.
In-line hardware keyloggers are undetectable by software
Answers
D.
In-line hardware keyloggers are relatively inexpensive
D.
In-line hardware keyloggers are relatively inexpensive
Answers
Suggested answer: C

The process of creating a system which divides documents based on their security level to manage access to private data is known as

A.
security coding
A.
security coding
Answers
B.
data security system
B.
data security system
Answers
C.
data classification
C.
data classification
Answers
D.
privacy protection
D.
privacy protection
Answers
Suggested answer: C

A customer of a bank has placed a dispute on a payment for a credit card account. The banking system uses digital signatures to safeguard the integrity of their transactions. The bank claims that the system shows proof that the customer in fact made the payment. What is this system capability commonly known as?

A.
non-repudiation
A.
non-repudiation
Answers
B.
conflict resolution
B.
conflict resolution
Answers
C.
strong authentication
C.
strong authentication
Answers
D.
digital rights management
D.
digital rights management
Answers
Suggested answer: A

The process for identifying, collecting, and producing digital information in support of legal proceedings is called

A.
chain of custody.
A.
chain of custody.
Answers
B.
electronic discovery.
B.
electronic discovery.
Answers
C.
evidence tampering.
C.
evidence tampering.
Answers
D.
electronic review.
D.
electronic review.
Answers
Suggested answer: B

Your organization provides open guest wireless access with no captive portals. What can you do to assist with law enforcement investigations if one of your guests is suspected of committing an illegal act using your network?

A.
Configure logging on each access point
A.
Configure logging on each access point
Answers
B.
Install a firewall software on each wireless access point.
B.
Install a firewall software on each wireless access point.
Answers
C.
Provide IP and MAC address
C.
Provide IP and MAC address
Answers
D.
Disable SSID Broadcast and enable MAC address filtering on all wireless access points.
D.
Disable SSID Broadcast and enable MAC address filtering on all wireless access points.
Answers
Suggested answer: C

One of your executives needs to send an important and confidential email. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys should be used to encrypt the message?

A.
Your public key
A.
Your public key
Answers
B.
The recipient's private key
B.
The recipient's private key
Answers
C.
The recipient's public key
C.
The recipient's public key
Answers
D.
Certificate authority key
D.
Certificate authority key
Answers
Suggested answer: C
Total 460 questions
Go to page: of 46