Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 312-50v11 Practice Exam with Questions & Answers | Set: 6

Questions 76

After an audit, the auditors Inform you that there is a critical finding that you must tackle Immediately. You read the audit report, and the problem is the service running on port 389. Which service Is this and how can you tackle the problem?

Options:
A.

The service is LDAP. and you must change it to 636. which is LDPAPS.

B.

The service is NTP. and you have to change It from UDP to TCP in order to encrypt it

C.

The findings do not require immediate actions and are only suggestions.

D.

The service is SMTP, and you must change it to SMIME. which is an encrypted way to send emails.

ECCouncil 312-50v11 Premium Access
Questions 77

Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?

Options:
A.

Presentation tier

B.

Application Layer

C.

Logic tier

D.

Data tier

Questions 78

What does the following command in netcat do?

nc -l -u -p55555 < /etc/passwd

Options:
A.

logs the incoming connections to /etc/passwd file

B.

loads the /etc/passwd file to the UDP port 55555

C.

grabs the /etc/passwd file when connected to UDP port 55555

D.

deletes the /etc/passwd file when connected to the UDP port 55555

Questions 79

what is the port to block first in case you are suspicious that an loT device has been compromised?

Options:
A.

22

B.

443

C.

48101

D.

80

Questions 80

Which of the following steps for risk assessment methodology refers to vulnerability identification?

Options:
A.

Determines if any flaws exist in systems, policies, or procedures

B.

Assigns values to risk probabilities; Impact values.

C.

Determines risk probability that vulnerability will be exploited (High. Medium, Low)

D.

Identifies sources of harm to an IT system. (Natural, Human. Environmental)

Questions 81

You start performing a penetration test against a specific website and have decided to start from grabbing all the links from the main page.

What Is the best Linux pipe to achieve your milestone?

Options:
A.

dirb <a href="https://site.com">https://site.com</a> | grep "site"

B.

curl -s <a href="https://sile.com">https://sile.com</a> | grep ‘’ < a href-\’http" | grep "Site-com- | cut -d "V" -f 2

C.

wget <a href="https://stte.com">https://stte.com</a> | grep "< a href=\*http" | grep "site.com"

D.

<a href="wgethttps://site.com">wgethttps://site.com</a> | cut-d "http-

Questions 82

How does a denial-of-service attack work?

Options:
A.

A hacker prevents a legitimate user (or group of users) from accessing a service

B.

A hacker uses every character, word, or letter he or she can think of to defeat authentication

C.

A hacker tries to decipher a password by using a system, which subsequently crashes the network

D.

A hacker attempts to imitate a legitimate user by confusing a computer or even another person

Questions 83

Which of the following program infects the system boot sector and the executable files at the same time?

Options:
A.

Polymorphic virus

B.

Stealth virus

C.

Multipartite Virus

D.

Macro virus

Questions 84

Firewalk has just completed the second phase (the scanning phase) and a technician receives the output shown below. What conclusions can be drawn based on these scan results?

TCP port 21 no response

TCP port 22 no response

TCP port 23 Time-to-live exceeded

Options:
A.

The lack of response from ports 21 and 22 indicate that those services are not running on the destination server

B.

The scan on port 23 was able to make a connection to the destination host prompting the firewall to respond with a TTL error

C.

The scan on port 23 passed through the filtering device. This indicates that port 23 was not blocked at the firewall

D.

The firewall itself is blocking ports 21 through 23 and a service is listening on port 23 of the target host

Questions 85

What is the minimum number of network connections in a multihomed firewall?

Options:
A.

3

B.

5

C.

4

D.

2

Questions 86

Which regulation defines security and privacy controls for Federal information systems and organizations?

Options:
A.

HIPAA

B.

EU Safe Harbor

C.

PCI-DSS

D.

NIST-800-53

Questions 87

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks like this:

From: jim_miller@companyxyz.com

To: michelle_saunders@companyxyz.com Subject: Test message

Date: 4/3/2017 14:37

The employee of CompanyXYZ receives your email message.

This proves that CompanyXYZ’s email gateway doesn’t prevent what?

Options:
A.

Email Masquerading

B.

Email Harvesting

C.

Email Phishing

D.

Email Spoofing

Questions 88

Henry is a penetration tester who works for XYZ organization. While performing enumeration on a client organization, he queries the DNS server for a specific cached DNS record. Further, by using this cached record, he determines the sites recently visited by the organization's user. What is the enumeration technique used by Henry on the organization?

Options:
A.

DNS zone walking

B.

DNS cache snooping

C.

DNS SEC zone walking

D.

DNS cache poisoning

Questions 89

A post-breach forensic investigation revealed that a known vulnerability in Apache Struts was to blame for the Equifax data breach that affected 143 million customers. A fix was available from the software vendor for several months prior 10 the Intrusion. This Is likely a failure in which of the following security processes?

Options:
A.

vendor risk management

B.

Security awareness training

C.

Secure deployment lifecycle

D.

Patch management

Questions 90

Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?

Options:
A.

Port 53

B.

Port 23

C.

Port 50

D.

Port 80