Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions
Questions # 1:

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

Options:

A.

Vulnerability scanning


B.

Social engineering


C.

Application security testing


D.

Network sniffing


Expert Solution
Questions # 2:

Which of the following is a component of a risk assessment?

Options:

A.

Physical security


B.

Administrative safeguards


C.

DMZ


D.

Logical interface


Expert Solution
Questions # 3:

Which of the following is considered an acceptable option when managing a risk?

Options:

A.

Reject the risk.


B.

Deny the risk.


C.

Mitigate the risk.


D.

Initiate the risk.


Expert Solution
Questions # 4:

Which of the following is a preventive control?

Options:

A.

Smart card authentication


B.

Security policy


C.

Audit trail


D.

Continuity of operations plan


Expert Solution
Questions # 5:

Passive reconnaissance involves collecting information through which of the following?

Options:

A.

Social engineering


B.

Network traffic sniffing


C.

Man in the middle attacks


D.

Publicly accessible sources


Expert Solution
Questions # 6:

Which of the following is a detective control?

Options:

A.

Smart card authentication


B.

Security policy


C.

Audit trail


D.

Continuity of operations plan


Expert Solution
Questions # 7:

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?

Question # 7

Options:

A.

The host is likely a Windows machine.


B.

The host is likely a Linux machine.


C.

The host is likely a router.


D.

The host is likely a printer.


Expert Solution
Questions # 8:

How can rainbow tables be defeated?

Options:

A.

Password salting


B.

Use of non-dictionary words


C.

All uppercase character passwords


D.

Lockout accounts under brute force password cracking attempts


Expert Solution
Questions # 9:

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

Options:

A.

Usernames


B.

File permissions


C.

Firewall rulesets


D.

Passwords


Expert Solution
Questions # 10:

Which of the following techniques will identify if computer files have been changed?

Options:

A.

Network sniffing


B.

Permission sets


C.

Integrity checking hashes


D.

Firewall alerts


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-10 out of questions