Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free ECCouncil 312-50v13 Practice Exam with Questions & Answers | Set: 11

Questions 151

What kind of detection techniques is being used in antivirus software that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment?

Options:
A.

Behavioral based

B.

Heuristics based

C.

Honeypot based

D.

Cloud based

ECCouncil 312-50v13 Premium Access
Questions 152

Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?

Options:
A.

Kismet

B.

Abel

C.

Netstumbler

D.

Nessus

Questions 153

Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company's network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161. what protocol is this port using and how can he secure that traffic?

Options:
A.

it is not necessary to perform any actions, as SNMP is not carrying important information.

B.

SNMP and he should change it to SNMP V3

C.

RPC and the best practice is to disable RPC completely

D.

SNMP and he should change it to SNMP v2, which is encrypted

Questions 154

Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?

Options:
A.

Known plaintext

B.

Password spraying

C.

Brute force

D.

Dictionary

Questions 155

Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/feed.php?url:externaIsile.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server. What is the type of attack Jason performed In the above scenario?

Options:
A.

website defacement

B.

Server-side request forgery (SSRF) attack

C.

Web server misconfiguration

D.

web cache poisoning attack

Questions 156

Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line utility.

Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?

Options:
A.

wash

B.

ntptrace

C.

macof

D.

net view

Questions 157

What does a firewall check to prevent particular ports and applications from getting packets into an organization?

Options:
A.

Transport layer port numbers and application layer headers

B.

Presentation layer headers and the session layer port numbers

C.

Network layer headers and the session layer port numbers

D.

Application layer port numbers and the transport layer headers

Questions 158

You start performing a penetration test against a specific website and have decided to start by grabbing all the links from the main page.

What is the best Linux pipe to achieve your milestone?

Options:
A.

dirb https://site.com | grep "site"

B.

curl -s https://site.com | grep '<a href='http' | grep "site.com" | cut -d "v" -f 2

C.

wget https://site.com | grep "<a href=*http" | grep "site.com"

D.

wget https://site.com | cut -d "http"

Questions 159

Given below are different steps involved in the vulnerability-management life cycle:

Remediation

Identify assets and create a baseline

Verification

Monitor

Vulnerability scan

Risk assessment

Identify the correct sequence of steps involved in vulnerability management.

Options:
A.

2 → 5 → 6 → 1 → 3 → 4

B.

2 → 1 → 5 → 6 → 4 → 3

C.

2 → 4 → 5 → 3 → 6 → 1

D.

1 → 2 → 3 → 4 → 5 → 6

Questions 160

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

Options:
A.

Produces less false positives

B.

Can identify unknown attacks

C.

Requires vendor updates for a new threat

D.

Cannot deal with encrypted network traffic

Questions 161

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

Options:
A.

Rootkit

B.

Trojan

C.

Worm

D.

Adware

Questions 162

Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?

Options:
A.

Wireshark

B.

Maltego

C.

Metasploit

D.

Nessus

Questions 163

Which tier in the N-tier application architecture is responsible for moving and processing data between the tiers?

Options:
A.

Presentation tier

B.

Application Layer

C.

Logic tier

D.

Data tier

Questions 164

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

Options:
A.

There is no way to tell because a hash cannot be reversed

B.

The rightmost portion of the hash is always the same

C.

The hash always starts with AB923D

D.

The leftmost portion of the hash is always the same

E.

A portion of the hash will be all 0's

Questions 165

During a red team engagement, an ethical hacker is tasked with testing the security measures of an organization's wireless network. The hacker needs to select an appropriate tool to carry out a session hijacking attack. Which of the following tools should the hacker use to effectively perform session hijacking and subsequent security analysis, given that the target wireless network has the Wi-Fi Protected Access-preshared key (WPA-PSK) security protocol in place?

Options:
A.

FaceNiff

B.

Hetty

C.

Droidsheep

D.

bettercap