Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil 512-50 Practice Exam with Questions & Answers | Set: 5

Questions 41

An anonymity network is a series of?

Options:
A.

Covert government networks

B.

War driving maps

C.

Government networks in Tora

D.

Virtual network tunnels

ECCouncil 512-50 Premium Access
Questions 42

What is the FIRST step in developing the vulnerability management program?

Options:
A.

Baseline the Environment

B.

Maintain and Monitor

C.

Organization Vulnerability

D.

Define Policy

Questions 43

An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?

Options:
A.

Shared key

B.

Asynchronous

C.

Open

D.

None

Questions 44

Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?

Options:
A.

In-line hardware keyloggers don’t require physical access

B.

In-line hardware keyloggers don’t comply to industry regulations

C.

In-line hardware keyloggers are undetectable by software

D.

In-line hardware keyloggers are relatively inexpensive

Questions 45

Security related breaches are assessed and contained through which of the following?

Options:
A.

The IT support team.

B.

A forensic analysis.

C.

Incident response

D.

Physical security team.

Questions 46

SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:

Options:
A.

‘ o 1=1 - -

B.

/../../../../

C.

“DROPTABLE USERNAME”

D.

NOPS

Questions 47

The ability to hold intruders accountable in a court of law is important. Which of the following activities are needed to ensure the highest possibility for successful prosecution?

Options:
A.

Well established and defined digital forensics process

B.

Establishing Enterprise-owned Botnets for preemptive attacks

C.

Be able to retaliate under the framework of Active Defense

D.

Collaboration with law enforcement

Questions 48

The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?

Options:
A.

The need to change accounting periods on a regular basis.

B.

The requirement to post entries for a closed accounting period.

C.

The need to create and modify the chart of accounts and its allocations.

D.

The lack of policies and procedures for the proper segregation of duties.

Questions 49

The process for identifying, collecting, and producing digital information in support of legal proceedings is called

Options:
A.

chain of custody.

B.

electronic discovery.

C.

evidence tampering.

D.

electronic review.

Questions 50

Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?

Options:
A.

Comprehensive Log-Files from all servers and network devices affected during the attack

B.

Fully trained network forensic experts to analyze all data right after the attack

C.

Uninterrupted Chain of Custody

D.

Expert forensics witness