Month End Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

ECCouncil 312-50 Exam Made Easy: Step-by-Step Preparation Guide

Questions 71

An attacker has been successfully modifying the purchase price of items purchased on the company's web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?

Options:
A.

By using SQL injection

B.

By changing hidden form values

C.

By using cross site scripting

D.

By utilizing a buffer overflow attack

ECCouncil 312-50 Premium Access
Questions 72

Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

Options:
A.

768 bit key

B.

1025 bit key

C.

1536 bit key

D.

2048 bit key

Questions 73

Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?

Options:
A.

NMAP

B.

Metasploit

C.

Nessus

D.

BeEF

Questions 74

Which of the following programming languages is most vulnerable to buffer overflow attacks?

Options:
A.

Perl

B.

C++

C.

Python

D.

Java

Questions 75

What are the three types of authentication?

Options:
A.

Something you: know, remember, prove

B.

Something you: have, know, are

C.

Something you: show, prove, are

D.

Something you: show, have, prove

Questions 76

While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?

Options:
A.

10.10.10.10

B.

127.0.0.1

C.

192.168.1.1

D.

192.168.168.168

Questions 77

Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?

Options:
A.

Firewall

B.

Honeypot

C.

Core server

D.

Layer 4 switch

Questions 78

After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?

Options:
A.

SHA1

B.

Diffie-Helman

C.

RSA

D.

AES

Questions 79

Which of the following items of a computer system will an anti-virus program scan for viruses?

Options:
A.

Boot Sector

B.

Deleted Files

C.

Windows Process List

D.

Password Protected Files

Questions 80

A developer for a company is tasked with creating a program that will allow customers to update their billing and shipping information. The billing address field used is limited to 50 characters. What pseudo code would the developer use to avoid a buffer overflow attack on the billing address field?

Options:
A.

if (billingAddress = 50) {update field} else exit

B.

if (billingAddress != 50) {update field} else exit

C.

if (billingAddress >= 50) {update field} else exit

D.

if (billingAddress <= 50) {update field} else exit