Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

Options:

A.

Vulnerability scanning


B.

Social engineering


C.

Application security testing


D.

Network sniffing


Questions # 2:

Which of the following is a component of a risk assessment?

Options:

A.

Physical security


B.

Administrative safeguards


C.

DMZ


D.

Logical interface


Questions # 3:

Which of the following is considered an acceptable option when managing a risk?

Options:

A.

Reject the risk.


B.

Deny the risk.


C.

Mitigate the risk.


D.

Initiate the risk.


Questions # 4:

Which of the following is a preventive control?

Options:

A.

Smart card authentication


B.

Security policy


C.

Audit trail


D.

Continuity of operations plan


Questions # 5:

Passive reconnaissance involves collecting information through which of the following?

Options:

A.

Social engineering


B.

Network traffic sniffing


C.

Man in the middle attacks


D.

Publicly accessible sources


Questions # 6:

Which of the following is a detective control?

Options:

A.

Smart card authentication


B.

Security policy


C.

Audit trail


D.

Continuity of operations plan


Questions # 7:

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?

Question # 7

Options:

A.

The host is likely a Windows machine.


B.

The host is likely a Linux machine.


C.

The host is likely a router.


D.

The host is likely a printer.


Questions # 8:

How can rainbow tables be defeated?

Options:

A.

Password salting


B.

Use of non-dictionary words


C.

All uppercase character passwords


D.

Lockout accounts under brute force password cracking attempts


Questions # 9:

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

Options:

A.

Usernames


B.

File permissions


C.

Firewall rulesets


D.

Passwords


Questions # 10:

Which of the following techniques will identify if computer files have been changed?

Options:

A.

Network sniffing


B.

Permission sets


C.

Integrity checking hashes


D.

Firewall alerts


Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions