New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-50 Practice Exam with Questions & Answers | Set: 9

Questions 81

How can a rootkit bypass Windows 7 operating system’s kernel mode, code signing policy?

Options:
A.

Defeating the scanner from detecting any code change at the kernel

B.

Replacing patch system calls with its own version that hides the rootkit (attacker's) actions

C.

Performing common services for the application process and replacing real applications with fake ones

D.

Attaching itself to the master boot record in a hard drive and changing the machine's boot sequence/options

ECCouncil 312-50 Premium Access
Questions 82

Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?

Options:
A.

Netstat WMI Scan

B.

Silent Dependencies

C.

Consider unscanned ports as closed

D.

Reduce parallel connections on congestion

Questions 83

Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?

Options:
A.

DataThief

B.

NetCat

C.

Cain and Abel

D.

SQLInjector

Questions 84

From the two screenshots below, which of the following is occurring?

312-50 Question 84

Options:
A.

10.0.0.253 is performing an IP scan against 10.0.0.0/24, 10.0.0.252 is performing a port scan against 10.0.0.2.

B.

10.0.0.253 is performing an IP scan against 10.0.0.2, 10.0.0.252 is performing a port scan against 10.0.0.2.

C.

10.0.0.2 is performing an IP scan against 10.0.0.0/24, 10.0.0.252 is performing a port scan against 10.0.0.2.

D.

10.0.0.252 is performing an IP scan against 10.0.0.2, 10.0.0.252 is performing a port scan against 10.0.0.2.

Questions 85

How is sniffing broadly categorized?

Options:
A.

Active and passive

B.

Broadcast and unicast

C.

Unmanaged and managed

D.

Filtered and unfiltered

Questions 86

Which protocol and port number might be needed in order to send log messages to a log analysis tool that resides behind a firewall?

Options:
A.

UDP 123

B.

UDP 541

C.

UDP 514

D.

UDP 415

Questions 87

When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?

Options:
A.

Network tap

B.

Layer 3 switch

C.

Network bridge

D.

Application firewall

Questions 88

What results will the following command yield: 'NMAP -sS -O -p 123-153 192.168.100.3'?

Options:
A.

A stealth scan, opening port 123 and 153

B.

A stealth scan, checking open ports 123 to 153

C.

A stealth scan, checking all open ports excluding ports 123 to 153

D.

A stealth scan, determine operating system, and scanning ports 123 to 153

Questions 89

What is the best defense against privilege escalation vulnerability?

Options:
A.

Patch systems regularly and upgrade interactive login privileges at the system administrator level.

B.

Run administrator and applications on least privileges and use a content registry for tracking.

C.

Run services with least privileged accounts and implement multi-factor authentication and authorization.

D.

Review user roles and administrator privileges for maximum utilization of automation services.

Questions 90

Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode a packet capture and extract the voice conversations?

Options:
A.

Cain

B.

John the Ripper

C.

Nikto

D.

Hping