ExamGecko
Home / ECCouncil / 312-50v12 / List of questions
Ask Question

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 33

List of questions

Question 321

Report
Export
Collapse

Bella, a security professional working at an it firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames. and passwords are shared In plaintext, paving the way for hackers 10 perform successful session hijacking. To address this situation. Bella Implemented a protocol that sends data using encryption and digital certificates.

Which of the following protocols Is used by Bella?

FTP
FTP
HTTPS
HTTPS
FTPS
FTPS
IP
IP
Suggested answer: C

Explanation:

The File Transfer Protocol (FTP) is a standard organization convention utilized for the exchange of PC records from a worker to a customer on a PC organization. FTP is based on a customer worker model engineering utilizing separate control and information associations between the customer and the server.[1] FTP clients may validate themselves with an unmistakable book sign-in convention, ordinarily as a username and secret key, however can interface namelessly if the worker is designed to permit it. For secure transmission that ensures the username and secret phrase, and scrambles the substance, FTP is frequently made sure about with SSL/TLS (FTPS) or supplanted with SSH File Transfer

Protocol (SFTP).

The primary FTP customer applications were order line programs created prior to working frameworks had graphical UIs, are as yet dispatched with most Windows, Unix, and Linux working systems.[2][3] Many FTP customers and mechanization utilities have since been created for working areas, workers, cell phones, and equipment, and FTP has been fused into profitability applications, for example, HTML editors.

asked 18/09/2024
Tyler Evans
36 questions

Question 322

Report
Export
Collapse

Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?

Tier-1: Developer machines
Tier-1: Developer machines
Tier-4: Orchestrators
Tier-4: Orchestrators
Tier-3: Registries
Tier-3: Registries
Tier-2: Testing and accreditation systems
Tier-2: Testing and accreditation systems
Suggested answer: D

Explanation:

The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls. formal declaration by a designated accrediting authority (DAA) or principal accrediting authority (PAA) that an information system is approved to operate at an acceptable level of risk, based on the implementation of an approved set of technical, managerial, and procedural safeguards. See authorization to operate (ATO). Rationale: The Risk Management Framework uses a new term to refer to this concept, and it is called authorization.

Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging. Synonymous with

Security Perimeter.

For the purposes of identifying the Protection Level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system. See authorization boundary.

Rationale: The Risk Management Framework uses a new term to refer to the concept of accreditation, and it is called authorization. Extrapolating, the accreditation boundary would then be referred to as the authorization boundary.

asked 18/09/2024
Ahmed Alghadeer
31 questions

Question 323

Report
Export
Collapse

which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

Bluesmacking
Bluesmacking
Bluebugging
Bluebugging
Bluejacking
Bluejacking
Bluesnarfing
Bluesnarfing
Suggested answer: D

Explanation:

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant).

Topic 3, Exam Pool C

asked 18/09/2024
Padmanabhan Kudiarasu
48 questions

Question 324

Report
Export
Collapse

if you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST. what do you know about the firewall you are scanning?

There is no firewall in place.
There is no firewall in place.
This event does not tell you encrypting about the firewall.
This event does not tell you encrypting about the firewall.
It is a stateful firewall
It is a stateful firewall
It Is a non-stateful firewall.
It Is a non-stateful firewall.
Suggested answer: B
asked 18/09/2024
Lee Greenshields
37 questions

Question 325

Report
Export
Collapse

Samuel, a professional hacker, monitored and Intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with <| packet having an Incremented ISN. Consequently. Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob. What is the type of attack performed by Samuel in the above scenario?

UDP hijacking
UDP hijacking
Blind hijacking
Blind hijacking
TCP/IP hacking
TCP/IP hacking
Forbidden attack
Forbidden attack
Suggested answer: C

Explanation:

A TCP/IP hijack is an attack that spoofs a server into thinking it's talking with a sound client, once actually it's communication with an assaulter that has condemned (or hijacked) the tcp session.

Assume that the client has administrator-level privileges, which the attacker needs to steal that authority so as to form a brand new account with root-level access of the server to be used afterward. A tcp Hijacking is sort of a two-phased man-in-the-middle attack. The man-in-the-middle assaulter lurks within the circuit between a shopper and a server so as to work out what port and sequence numbers are being employed for the conversation.

First, the attacker knocks out the client with an attack, like Ping of Death, or ties it up with some reasonably ICMP storm. This renders the client unable to transmit any packets to the server. Then, with the client crashed, the attacker assumes the client's identity so as to talk with the server. By this suggests, the attacker gains administrator-level access to the server.

One of the most effective means of preventing a hijack attack is to want a secret, that's a shared secret between the shopper and also the server. looking on the strength of security desired, the key may be used for random exchanges. this is often once a client and server periodically challenge each other, or it will occur with each exchange, like Kerberos.

asked 18/09/2024
Heritier kandolo
47 questions

Question 326

Report
Export
Collapse

Dorian Is sending a digitally signed email to Polly, with which key is Dorian signing this message and how is Poly validating It?

Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.
Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.
Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.
Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.
Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.
Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.
Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.
Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.
Suggested answer: C

Explanation:

https://blog.mailfence.com/how-do-digital-signatures-work/

https://en.wikipedia.org/wiki/Digital_signature

A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. It's the digital equivalent of a handwritten signature or stamped seal, but it offers far more inherent security. A digital signature is intended to solve the problem of tampering and impersonation in digital communications.

Digital signatures can provide evidence of origin, identity, and status of electronic documents, transactions, or digital messages. Signers can also use them to acknowledge informed consent.

Digital signatures are based on public-key cryptography, also known as asymmetric cryptography.

Two keys are generated using a public key algorithm, such as RSA (Rivest-Shamir-Adleman), creating a mathematically linked pair of keys, one private and one public.

Digital signatures work through public-key cryptography's two mutually authenticating cryptographic keys. The individual who creates the digital signature uses a private key to encrypt signature-related data, while the only way to decrypt that data is with the signer's public key.

asked 18/09/2024
DANIEL DOYEN
33 questions

Question 327

Report
Export
Collapse

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the Information, he successfully performed an attack on the target government organization without being traced. Which of the following techniques is described in the above scenario?

Dark web footprinting
Dark web footprinting
VoIP footpnnting
VoIP footpnnting
VPN footprinting
VPN footprinting
website footprinting
website footprinting
Suggested answer: A

Explanation:

The deep web is the layer of the online cyberspace that consists of web pages and content that are hidden and unindexed.

asked 18/09/2024
Roman Flores
33 questions

Question 328

Report
Export
Collapse

An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization deckled to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware. Which of the following tools must the organization employ to protect its critical infrastructure?

Robotium
Robotium
BalenaCloud
BalenaCloud
Flowmon
Flowmon
IntentFuzzer
IntentFuzzer
Suggested answer: C

Explanation:

Source: https://www.flowmon.com Flowmon empowers manufacturers and utility companies to ensure the reliability of their industrial networks confidently to avoid downtime and disruption of service continuity. This can be achieved by continuous monitoring and anomaly detection so that malfunctioning devices or security incidents, such as cyber espionage, zero-days, or malware, can be reported and remedied as quickly as possible.

asked 18/09/2024
Malik Rubio
40 questions

Question 329

Report
Export
Collapse

By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext.

Which file do you have to clean to clear the password?

.X session-log
.X session-log
.bashrc
.bashrc
.profile
.profile
.bash_history
.bash_history
Suggested answer: D

Explanation:

File created by Bash, a Unix-based shell program commonly used on Mac OS X and Linux operating systems; stores a history of user commands entered at the command prompt; used for viewing old commands that are executed.

BASH_HISTORY files are hidden files with no filename prefix. They always use the filename .bash_history.

NOTE: Bash is that the shell program employed by Apple Terminal.

Our goal is to assist you understand what a file with a *.bash_history suffix is and the way to open it.

The Bash History file type, file format description, and Mac and Linux programs listed on this page are individually researched and verified by the FileInfo team. we attempt for 100% accuracy and only publish information about file formats that we've tested and validated.

asked 18/09/2024
Pawel Lenart
34 questions

Question 330

Report
Export
Collapse

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on Don in the above scenario?

SMS phishing attack
SMS phishing attack
SIM card attack
SIM card attack
Agent Smith attack
Agent Smith attack
Clickjacking
Clickjacking
Suggested answer: C

Explanation:

Agent Smith Attack Agent Smith attacks are carried out by luring victims into downloading and installing malicious apps designed and published by attackers in the form of games, photo editors, or other attractive tools from third-party app stores such as 9Apps. Once the user has installed the app, the core malicious code inside the application infects or replaces the legitimate apps in the victim's mobile device C&C commands. The deceptive application replaces legitimate apps such as WhatsApp, SHAREit, and MX Player with similar infected versions. The application sometimes also appears to be an authentic Google product such as Google Updater or Themes. The attacker then produces a massive volume of irrelevant and fraudulent advertisements on the victim's device through the infected app for financial gain. Attackers exploit these apps to steal critical information such as personal information, credentials, and bank details, from the victim's mobile device through C&C commands.

asked 18/09/2024
Francisco Jesús Cano Hinarejos
53 questions
Total 573 questions
Go to page: of 58
Search

Related questions