Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

312-50v11Free trialFree trial

By eccouncil
Aug, 2025

Verified

25Q per page

Question 51

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson's machine.
What is the social engineering technique Steve employed in the above scenario?

  • A: Diversion theft
  • B: Quid pro quo
  • C: Elicitation
  • D: Phishing

Question 52

In an attempt to increase the security of your network, you implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know it.
How do you accomplish this?

  • A: Delete the wireless network
  • B: Lock all users
  • C: Disable SSID broadcasting
  • D: Remove all passwords

Question 53

Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?

  • A: Wardriving
  • B: Wireless sniffing
  • C: Evil twin
  • D: Piggybacking

Question 54

To create a botnet, the attacker can use several techniques to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines.
The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.
Which technique is discussed here?

  • A: Subnet scanning technique
  • B: Permutation scanning technique
  • C: Hit-list scanning technique.
  • D: Topological scanning technique

Question 55

Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced.
Which of the following techniques is described in the above scenario?

  • A: Website footprinting
  • B: Dark web footprinting
  • C: VPN footprinting
  • D: VoIP footprinting

Question 56

An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?

  • A: Service-based solutions
  • B: Product-based solutions
  • C: Tree-based assessment
  • D: Inference-based assessment

Question 57

Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal standpoint, what would be troublesome to take this kind of measure?

  • A: All of the employees would stop normal work activities
  • B: IT department would be telling employees who the boss is
  • C: Not informing the employees that they are going to be monitored could be an invasion of privacy.
  • D: The network could still experience traffic slow down.

Question 58

Dorian is sending a digitally signed email to Poly. With which key is Dorian signing this message and how is Poly validating it?

  • A: Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian's private key.
  • B: Dorian is signing the message with Poly's private key, and Poly will verify that the message came from Dorian by using Dorian's public key.
  • C: Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian's public key.
  • D: Dorian is signing the message with Poly's public key, and Poly will verify that the message came from Dorian by using Dorian's public key.

Question 59

At what stage of the cyber kill chain theory model does data exfiltration occur?

  • A: Weaponization
  • B: Actions on objectives
  • C: Command and control
  • D: Installation

Question 60

Heather's company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the hardware, operating system, and software administration including patching and monitoring.
Which of the following is this type of solution?

  • A: Iaas
  • B: Saas
  • C: PaaS
  • D: Caas

Question 61

By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext.
Which file do you have to clean to clear the password?

  • A: .xsession-log
  • B: .profile
  • C: .bashrc
  • D: .bash_history

Question 62

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

  • A: Scanning
  • B: Gaining access
  • C: Maintaining access
  • D: Reconnaissance

Question 63

John is investigating web-application firewall logs and observers that someone is attempting to inject the following:

Image 1

What type of attack is this?

  • A: SQL injection
  • B: Buffer overflow
  • C: CSRF
  • D: XSS

Question 64

Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. During analysis, he found that these issues are not true vulnerabilities.
What will you call these issues?

  • A: False positives
  • B: True negatives
  • C: True positives
  • D: False negatives

Question 65

Which file is a rich target to discover the structure of a website during web-server footprinting?

  • A: domain.txt
  • B: Robots.txt
  • C: Document root
  • D: index.html

Question 66

What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?

  • A: White-hat hacking program
  • B: Bug bounty program
  • C: Ethical hacking program
  • D: Vulnerability hunting program

Question 67

There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to join with a group of users or organizations to share a cloud environment.
What is this cloud deployment option called?

  • A: Private
  • B: Community
  • C: Public
  • D: Hybrid

Question 68

Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?

  • A: Nikto
  • B: John the Ripper
  • C: Dsniff
  • D: Snort

Question 69

Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network.
Which of the following host discovery techniques must he use to perform the given task?

  • A: UDP scan
  • B: ARP ping scan
  • C: ACK flag probe scan
  • D: TCP Maimon scan

Question 70

An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization decided to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware.
Which of the following tools must the organization employ to protect its critical infrastructure?

  • A: Robotium
  • B: BalenaCloud
  • C: Flowmon
  • D: IntentFuzzer

Question 71

Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins.
What is the type of attack technique Ralph used on Jane?

  • A: Impersonation
  • B: Dumpster diving
  • C: Shoulder surfing
  • D: Eavesdropping

Question 72

Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates.
Which of the following protocols is used by Bella?

  • A: FTPS
  • B: FTP
  • C: HTTPS
  • D: IP

Question 73

Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.
What type of malware did the attacker use to bypass the company's application whitelisting?

  • A: File-less malware
  • B: Zero-day malware
  • C: Phishing malware
  • D: Logic bomb malware

Question 74

Kevin, a professional hacker, wants to penetrate CyberTech Inc's network. He employed a technique, using which he encoded packets with Unicode characters.
The company's IDS cannot recognize the packets, but the target web server can decode them.
What is the technique used by Kevin to evade the IDS system?

  • A: Session splicing
  • B: Urgency flag
  • C: Obfuscating
  • D: Desynchronization

Question 75

To invisibly maintain access to a machine, an attacker utilizes a rootkit that sits undetected in the core components of the operating system. What is this type of rootkit an example of?

  • A: Hypervisor rootkit
  • B: Kernel rootkit
  • C: Hardware rootkit
  • D: Firmware rootkit
Page 3 of 16 • Questions 51-75 of 400

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!