Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

312-50v11Free trialFree trial

By eccouncil
Aug, 2025

Verified

25Q per page

Question 76

Which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?

  • A: Botnet
  • B: Intrusion detection system
  • C: Firewall
  • D: Honeypot

Question 77

Jim, a professional hacker, targeted an organization that is operating critical industrial infrastructure. Jim used Nmap to scan open ports and running services on systems connected to the organization's OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered information such as the vendor name, product code and name, device name, and IP address.
Which of the following Nmap commands helped Jim retrieve the required information?

  • A: nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >
  • B: nmap -Pn -sU -p 44818 --script enip-info < Target IP >
  • C: nmap -Pn -sT -p 46824 < Target IP >
  • D: nmap -Pn -sT -p 102 --script s7-info < Target IP >

Question 78

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

  • A: IDEA
  • B: Triple Data Encryption Standard
  • C: AES
  • D: MD5 encryption algorithm

Question 79

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?

  • A: The network devices are not all synchronized.
  • B: Proper chain of custody was not observed while collecting the logs.
  • C: The attacker altered or erased events from the logs.
  • D: The security breach was a false positive.

Question 80

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.
What is the port scanning technique used by Sam to discover open ports?

  • A: Xmas scan
  • B: IDLE/IPID header scan
  • C: TCP Maimon scan
  • D: ACK flag probe scan

That’s the end of your free questions

You’ve reached the preview limit for 312-50v11

Consider upgrading to gain full access!

Page 4 of 16 • Questions 76-100 of 400

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!