312-50Free trialFree trial

By eccouncil
Aug, 2025

Verified

25Q per page

Question 1

Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?

  • A: Fast processor to help with network traffic analysis
  • B: They must be dual-homed
  • C: Similar RAM requirements
  • D: Fast network interface cards

Question 2

Which of the following is an application that requires a host application for replication?

  • A: Micro
  • B: Worm
  • C: Trojan
  • D: Virus

Question 3

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?

  • A: Paros Proxy
  • B: BBProxy
  • C: BBCrack
  • D: Blooover

Question 4

Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?

  • A: Restore a random file.
  • B: Perform a full restore.
  • C: Read the first 512 bytes of the tape.
  • D: Read the last 512 bytes of the tape.

Question 5

Which of the following describes the characteristics of a Boot Sector Virus?

  • A: Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
  • B: Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
  • C: Modifies directory table entries so that directory entries point to the virus code instead of the actual program
  • D: Overwrites the original MBR and only executes the new virus code

Question 6

Which statement is TRUE regarding network firewalls preventing Web Application attacks?

  • A: Network firewalls can prevent attacks because they can detect malicious HTTP traffic.
  • B: Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.
  • C: Network firewalls can prevent attacks if they are properly configured.
  • D: Network firewalls cannot prevent attacks because they are too complex to configure.

Question 7

Which of the following programs is usually targeted at Microsoft Office products?

  • A: Polymorphic virus
  • B: Multipart virus
  • C: Macro virus
  • D: Stealth virus

Question 8

Bluetooth uses which digital modulation technique to exchange information between paired devices?

  • A: PSK (phase-shift keying)
  • B: FSK (frequency-shift keying)
  • C: ASK (amplitude-shift keying)
  • D: QAM (quadrature amplitude modulation)

Question 9

In order to show improvement of security over time, what must be developed?

  • A: Reports
  • B: Testing tools
  • C: Metrics
  • D: Taxonomy of vulnerabilities

Question 10

Passive reconnaissance involves collecting information through which of the following?

  • A: Social engineering
  • B: Network traffic sniffing
  • C: Man in the middle attacks
  • D: Publicly accessible sources

Question 11

Which of the following is a component of a risk assessment?

  • A: Physical security
  • B: Administrative safeguards
  • C: DMZ
  • D: Logical interface

Question 12

When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

  • A: Vulnerability scanning
  • B: Social engineering
  • C: Application security testing
  • D: Network sniffing

Question 13

A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?

  • A: Reject all invalid email received via SMTP.
  • B: Allow full DNS zone transfers.
  • C: Remove A records for internal hosts.
  • D: Enable null session pipes.

Question 14

Which of the following techniques will identify if computer files have been changed?

  • A: Network sniffing
  • B: Permission sets
  • C: Integrity checking hashes
  • D: Firewall alerts

Question 15

Which system consists of a publicly available set of databases that contain domain name registration contact information?

  • A: WHOIS
  • B: IANA
  • C: CAPTCHA
  • D: IETF

Question 16

A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the bank's DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the bank's job postings (paying special attention to IT related jobs), and visiting the local dumpster for the bank's corporate office. What phase of the penetration test is the tester currently in?

  • A: Information reporting
  • B: Vulnerability assessment
  • C: Active information gathering
  • D: Passive information gathering

Question 17

An NMAP scan of a server shows port 69 is open. What risk could this pose?

  • A: Unauthenticated access
  • B: Weak SSL version
  • C: Cleartext login
  • D: Web portal data leak

Question 18

What information should an IT system analysis provide to the risk assessor?

  • A: Management buy-in
  • B: Threat statement
  • C: Security architecture
  • D: Impact analysis

Question 19

How can rainbow tables be defeated?

  • A: Password salting
  • B: Use of non-dictionary words
  • C: All uppercase character passwords
  • D: Lockout accounts under brute force password cracking attempts

Question 20

Which results will be returned with the following Google search query? site:target.com -site:Marketing.target.com accounting

  • A: Results matching all words in the query
  • B: Results matching "accounting" in domain target.com but not on the site Marketing.target.com
  • C: Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting
  • D: Results for matches on target.com and Marketing.target.com that include the word "accounting"

Question 21

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

  • A: Perform a vulnerability scan of the system.
  • B: Determine the impact of enabling the audit feature.
  • C: Perform a cost/benefit analysis of the audit feature.
  • D: Allocate funds for staffing of audit log review.

Question 22

Which of the following is considered an acceptable option when managing a risk?

  • A: Reject the risk.
  • B: Deny the risk.
  • C: Mitigate the risk.
  • D: Initiate the risk. C

Question 23

Which security control role does encryption meet?

  • A: Preventative
  • B: Detective
  • C: Offensive
  • D: Defensive

Question 24

A covert channel is a channel that

  • A: transfers information over, within a computer system, or network that is outside of the security policy.
  • B: transfers information over, within a computer system, or network that is within the security policy.
  • C: transfers information via a communication path within a computer system, or network for transfer of data.
  • D: transfers information over, within a computer system, or network that is encrypted.

Question 25

John the Ripper is a technical assessment tool used to test the weakness of which of the following?

  • A: Usernames
  • B: File permissions
  • C: Firewall rulesets
  • D: Passwords
Page 1 of 9 • Questions 1-25 of 205

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!