312-50v10Free trialFree trial

By eccouncil
Aug, 2025

Verified

25Q per page

Question 1

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

  • A: Reverse Social Engineering
  • B: Tailgating
  • C: Piggybacking
  • D: Announced

Question 2

_________ is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.

  • A: DNSSEC
  • B: Resource records
  • C: Resource transfer
  • D: Zone transfer

Question 3

Internet Protocol Security IPSec is actually a suite of protocols. Each protocol within the suite provides different functionality. Collective IPSec does everything except.

  • A: Work at the Data Link Layer
  • B: Protect the payload and the headers
  • C: Encrypt
  • D: Authenticate

Question 4

On performing a risk assessment, you need to determine the potential impacts when some of the critical business process of the company interrupt its service.
What is the name of the process by which you can determine those critical business?

  • A: Risk Mitigation
  • B: Emergency Plan Response (EPR)
  • C: Disaster Recovery Planning (DRP)
  • D: Business Impact Analysis (BIA)

Question 5

Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends "many" IP packets, based on the average number of packets sent by all origins and using some thresholds.
In concept, the solution developed by Bob is actually:

  • A: Just a network monitoring tool
  • B: A signature-based IDS
  • C: A hybrid IDS
  • D: A behavior-based IDS

Question 6

Which regulation defines security and privacy controls for Federal information systems and organizations?

  • A: HIPAA
  • B: EU Safe Harbor
  • C: PCI-DSS
  • D: NIST-800-53

Question 7

PGP, SSL, and IKE are all examples of which type of cryptography?

  • A: Hash Algorithm
  • B: Digest
  • C: Secret Key
  • D: Public Key

Question 8

You are a security officer of a company. You had an alert from IDS that indicates that one PC on your Intranet is connected to a blacklisted IP address (C2 Server) on the Internet. The IP address was blacklisted just before the alert. You are staring an investigation to roughly analyze the severity of the situation. Which of the following is appropriate to analyze?

  • A: Event logs on the PC
  • B: Internet Firewall/Proxy log
  • C: IDS log
  • D: Event logs on domain controller

Question 9

It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?

  • A: Discovery
  • B: Recovery
  • C: Containment
  • D: Eradication

Question 10

Which of the following cryptography attack is an understatement for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by a coercion or torture?

  • A: Chosen-Cipher text Attack
  • B: Ciphertext-only Attack
  • C: Timing Attack
  • D: Rubber Hose Attack

Question 11

In cryptanalysis and computer security, 'pass the hash' is a hacking technique that allows an attacker to authenticate to a remote server/service by using the underlying NTLM and/or LanMan hash of a user's password, instead of requiring the associated plaintext password as is normally the case.
Metasploit Framework has a module for this technique: psexec. The psexec module is often used by penetration testers to obtain access to a given system whose credentials are known. It was written by sysinternals and has been integrated within the framework. The penetration testers successfully gain access to a system through some exploit, use meterpreter to grab the passwords or other methods like fgdump, pwdump, or cachedump and then utilize rainbowtables to crack those hash values.
Which of the following is true hash type and sort order that is used in the psexec module's 'smbpass' option?

  • A: LM:NT
  • B: NTLM:LM
  • C: NT:LM
  • D: LM:NTLM

Question 12

You are looking for SQL injection vulnerability by sending a special character to web applications. Which of the following is the most useful for quick validation?

  • A: Double quotation
  • B: Backslash
  • C: Semicolon
  • D: Single quotation

Question 13

A virus that attempts to install itself inside the file it is infecting is called?

  • A: Tunneling virus
  • B: Cavity virus
  • C: Polymorphic virus
  • D: Stealth virus

Question 14

Cross-site request forgery involves:

  • A: A request sent by a malicious user from a browser to a server
  • B: Modification of a request by a proxy between client and server
  • C: A browser making a request to a server without the user's knowledge
  • D: A server making a request to another server without the user's knowledge

Question 15

Which of the following is considered as one of the most reliable forms of TCP scanning?

  • A: TCP Connect/Full Open Scan
  • B: Half-open Scan
  • C: NULL Scan
  • D: Xmas Scan

Question 16

Image 1

What does the option * indicate?

  • A: s
  • B: t
  • C: n
  • D: a

Question 17

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and
Virtual Private Networks (VPN) over a Frame Relay network.
Which AAA protocol is the most likely able to handle this requirement?

  • A: DIAMETER
  • B: RADIUS
  • C: TACACS+
  • D: Kerberos

Question 18

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

  • A: hping2 -1 host.domain.com
  • B: hping2-i host.domain.com
  • C: hping2 ""set-ICMP host.domain.com
  • D: hping2 host.domain.com

Question 19

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

  • A: Session hijacking
  • B: Firewalking
  • C: Man-in-the middle attack
  • D: Network sniffing

Question 20

What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

  • A: Passive
  • B: Active
  • C: Reflective
  • D: Distributive

Question 21

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System
(OS) version installed. Considering that NMAP result below, which of the following is likely to be installed on the target machine by the OS? Starting NMAP 5.21 at
2011-03-15 11:06 NMAP scan report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbios-ssn 515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8

  • A: The host is likely a Linux machine.
  • B: The host is likely a printer.
  • C: The host is likely a router.
  • D: The host is likely a Windows machine.

Question 22

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database.
<iframe src=""http://www.vulnweb.com/updateif.php"" style=""display:none""></iframe>
What is this type of attack (that can use either HTTP GET or HTTP POST) called?

  • A: Cross-Site Request Forgery
  • B: SQL Injection
  • C: Browser Hacking
  • D: Cross-Site Scripting

Question 23

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

  • A: He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
  • B: He will activate OSPF on the spoofed root bridge.
  • C: He will repeat this action so that it escalates to a DoS attack.
  • D: He will repeat the same attack against all L2 switches of the network.

Question 24

Which access control mechanism allows for multiple systems to use a central authentication server (CAS) that permits users to authenticate once and gain access to multiple systems?

  • A: Single sign-on
  • B: Windows authentication
  • C: Role Based Access Control (RBAC)
  • D: Discretionary Access Control (DAC)

Question 25

To reach a bank web site, the traffic from workstations must pass through a firewall. You have been asked to review the firewall configuration to ensure that workstations in network 10.10.10.0/24 can only reach the bank web site 10.20.20.1 using https. Which of the following firewall rules meets this requirement?

  • A: If (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 443) then permit
  • B: If (source matches 10.10.10.0/24 and destination matches 10.20.20.1 and port matches 80 or 443) then permit
  • C: If (source matches 10.20.20.1 and destination matches 10.10.10.0/24 and port matches 443) then permit
  • D: If (source matches 10.10.10.0 and destination matches 10.20.20.1 and port matches 443) then permit
Page 1 of 9 • Questions 1-25 of 201

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!