Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?

Options:

A.

Fast processor to help with network traffic analysis


B.

They must be dual-homed


C.

Similar RAM requirements


D.

Fast network interface cards


Expert Solution
Questions # 72:

In order to show improvement of security over time, what must be developed?

Options:

A.

Reports


B.

Testing tools


C.

Metrics


D.

Taxonomy of vulnerabilities


Expert Solution
Questions # 73:

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

Options:

A.

Restore a random file.


B.

Perform a full restore.


C.

Read the first 512 bytes of the tape.


D.

Read the last 512 bytes of the tape.


Expert Solution
Questions # 74:

Which of the following is an application that requires a host application for replication?

Options:

A.

Micro


B.

Worm


C.

Trojan


D.

Virus


Expert Solution
Questions # 75:

Bluetooth uses which digital modulation technique to exchange information between paired devices?

Options:

A.

PSK (phase-shift keying)


B.

FSK (frequency-shift keying)


C.

ASK (amplitude-shift keying)


D.

QAM (quadrature amplitude modulation)


Expert Solution
Questions # 76:

Which of the following programs is usually targeted at Microsoft Office products?

Options:

A.

Polymorphic virus


B.

Multipart virus


C.

Macro virus


D.

Stealth virus


Expert Solution
Questions # 77:

Which of the following describes the characteristics of a Boot Sector Virus?

Options:

A.

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR


B.

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR


C.

Modifies directory table entries so that directory entries point to the virus code instead of the actual program


D.

Overwrites the original MBR and only executes the new virus code


Expert Solution
Questions # 78:

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

Options:

A.

Paros Proxy


B.

BBProxy


C.

BBCrack


D.

Blooover


Expert Solution
Questions # 79:

What does the following command in netcat do?

nc -l -u -p55555 < /etc/passwd

Options:

A.

logs the incoming connections to /etc/passwd file


B.

loads the /etc/passwd file to the UDP port 55555


C.

grabs the /etc/passwd file when connected to UDP port 55555


D.

deletes the /etc/passwd file when connected to the UDP port 55555


Expert Solution
Questions # 80:

Which type of Nmap scan is the most reliable, but also the most visible, and likely to be picked up by and IDS?

Options:

A.

SYN scan


B.

ACK scan


C.

RST scan


D.

Connect scan


E.

FIN scan


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 71-80 out of questions