Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

312-49v10Free trialFree trial

By eccouncil
Aug, 2025

Verified

25Q per page

Question 26

When examining a file with a Hex Editor, what space does the file header occupy?

  • A: the last several bytes of the file
  • B: the first several bytes of the file
  • C: none, file headers are contained in the FAT
  • D: one byte at the beginning of the file

Question 27

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

  • A: The zombie will not send a response
  • B: 31402
  • C: 31399
  • D: 31401

Question 28

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using
Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

  • A: Closed
  • B: Open
  • C: Stealth
  • D: Filtered

Question 29

You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

  • A: Packet filtering firewall
  • B: Circuit-level proxy firewall
  • C: Application-level proxy firewall
  • D: Stateful firewall

Question 30

Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests.
What type of scan is Jessica going to perform?

  • A: Tracert
  • B: Smurf scan
  • C: Ping trace
  • D: ICMP ping sweep

Question 31

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?

  • A: Ping sweep
  • B: Nmap
  • C: Netcraft
  • D: Dig

Question 32

You are a security analyst performing a penetration tests for a company in the Midwest. After some initial reconnaissance, you discover the IP addresses of some
Cisco routers used by the company. You type in the following URL that includes the IP address of one of the routers: http://172.168.4.131/level/99/exec/show/config
After typing in this URL, you are presented with the entire configuration file for that router. What have you discovered?

  • A: HTTP Configuration Arbitrary Administrative Access Vulnerability
  • B: HTML Configuration Arbitrary Administrative Access Vulnerability
  • C: Cisco IOS Arbitrary Administrative Access Online Vulnerability
  • D: URL Obfuscation Arbitrary Administrative Access Vulnerability

Question 33

What is the following command trying to accomplish?
C:> nmap "sU "p445 192.168.0.0/24

  • A: Verify that UDP port 445 is open for the 192.168.0.0 network
  • B: Verify that TCP port 445 is open for the 192.168.0.0 network
  • C: Verify that NETBIOS is running for the 192.168.0.0 network
  • D: Verify that UDP port 445 is closed for the 192.168.0.0 network

Question 34

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?

  • A: Passwords of 14 characters or less are broken up into two 7-character hashes
  • B: A password Group Policy change takes at least 3 weeks to completely replicate throughout a network
  • C: Networks using Active Directory never use SAM databases so the SAM database pulled was empty
  • D: The passwords that were cracked are local accounts on the Domain Controller

Question 35

An "idle" system is also referred to as what?

  • A: PC not connected to the Internet
  • B: Zombie
  • C: PC not being used
  • D: Bot

Question 36

In the context of file deletion process, which of the following statement holds true?

  • A: When files are deleted, the data is overwritten and the cluster marked as available
  • B: The longer a disk is in use, the less likely it is that deleted files will be overwritten
  • C: While booting, the machine may create temporary files that can delete evidence
  • D: Secure delete programs work by completely overwriting the file in one go

Question 37

John and Hillary works at the same department in the company. John wants to find out Hillary's network password so he can take a look at her documents on the file server. He enables Lophtcrack program to sniffing mode. John sends Hillary an email with a link to Error! Reference source not found. What information will he be able to gather from this?

  • A: Hillary network username and password hash
  • B: The SID of Hillary network account
  • C: The SAM file from Hillary computer
  • D: The network shares that Hillary has permissions

Question 38

Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops contained sensitive corporate information regarding patents and company strategies. A month after the laptops were stolen, a competing company was found to have just developed products that almost exactly duplicated products that Meyer produces. What could have prevented this information from being stolen from the laptops?

  • A: EFS Encryption
  • B: DFS Encryption
  • C: IPS Encryption
  • D: SDW Encryption

Question 39

What is the target host IP in the following command?
c:>firewalk -F 80 10.10.150.1 172.16.28.95 -p UDP

  • A: 172.16.28.95
  • B: 10.10.150.1
  • C: Firewalk does not scan target hosts
  • D: This command is using FIN packets, which cannot scan target hosts

Question 40

George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used.
What IDS feature must George implement to meet this requirement?

  • A: Signature-based anomaly detection
  • B: Pattern matching
  • C: Real-time anomaly detection
  • D: Statistical-based anomaly detection

Question 41

John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

  • A: Firewalk cannot pass through Cisco firewalls
  • B: Firewalk sets all packets with a TTL of zero
  • C: Firewalk cannot be detected by network sniffers
  • D: Firewalk sets all packets with a TTL of one

Question 42

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as
"stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

  • A: Nessus is too loud
  • B: Nessus cannot perform wireless testing
  • C: Nessus is not a network scanner
  • D: There are no ways of performing a "stealthy" wireless scan

Question 43

George is the network administrator of a large Internet company on the west coast. Per corporate policy, none of the employees in the company are allowed to use FTP or SFTP programs without obtaining approval from the IT department. Few managers are using SFTP program on their computers. Before talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to monitor network traffic, but only SFTP traffic to and from his network.
What filter should George use in Ethereal?

  • A: src port 23 and dst port 23
  • B: udp port 22 and host 172.16.28.1/24
  • C: net port 22
  • D: src port 22 and dst port 22

Question 44

In Linux, what is the smallest possible shellcode?

  • A: 24 bytes
  • B: 8 bytes
  • C: 800 bytes
  • D: 80 bytes

Question 45

Jim performed a vulnerability analysis on his network and found no potential problems. He runs another utility that executes exploits against his system to verify the results of the vulnerability test.
The second utility executes five known exploits against his network in which the vulnerability analysis said were not exploitable. What kind of results did Jim receive from his vulnerability analysis?

  • A: False negatives
  • B: False positives
  • C: True negatives
  • D: True positives

Question 46

What operating system would respond to the following command? c:> nmap -sW 10.10.145.65

  • A: Windows 95
  • B: FreeBSD
  • C: Windows XP
  • D: Mac OS X

Question 47

On Linux/Unix based Web servers, what privilege should the daemon service be run under?

  • A: Guest
  • B: Root
  • C: You cannot determine what privilege runs the daemon service
  • D: Something other than root

Question 48

What is kept in the following directory? HKLM\SECURITY\Policy\Secrets

  • A: Cached password hashes for the past 20 users
  • B: Service account passwords in plain text
  • C: IAS account names and passwords
  • D: Local store PKI Kerberos certificates

Question 49

Harold is a security analyst who has just run the rdisk /s command to grab the backup SAM files on a computer. Where should Harold navigate on the computer to find the file?

  • A: %systemroot%\system32\LSA
  • B: %systemroot%\system32\drivers\etc
  • C: %systemroot%\repair
  • D: %systemroot%\LSA

Question 50

You are trying to locate Microsoft Outlook Web Access Default Portal using Google search on the Internet. What search string will you use to locate them?

  • A: allinurl:"exchange/logon.asp"
  • B: intitle:"exchange server"
  • C: locate:"logon page"
  • D: outlook:"search"
Page 2 of 25 • Questions 26-50 of 610

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!