Pass4itsure > EC-COUNCIL > Certified Ethical Hacker > 312-50V7 > 312-50V7 Online Practice Questions and Answers

312-50V7 Online Practice Questions and Answers

Questions 4

Charlie is the network administrator for his company. Charlie just received a new Cisco router and wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its locking up. The IP address of the Cisco switch is 172.16.0.45. What command can Charlie use to attempt this task?

A. Charlie can use the commanD. ping -l 56550 172.16.0.45 -t.

B. Charlie can try using the commanD. ping 56550 172.16.0.45.

C. By using the command ping 172.16.0.45 Charlie would be able to lockup the router

D. He could use the commanD. ping -4 56550 172.16.0.45.

Buy Now
Questions 5

Bill is a security analyst for his company. All the switches used in the company's office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Bill accomplish this?

A. Bill can use the command: ip dhcp snooping.

B. Bill can use the command: no ip snoop.

C. Bill could use the command: ip arp no flood.

D. He could use the command: ip arp no snoop.

Buy Now
Questions 6

Why attackers use proxy servers?

A. To ensure the exploits used in the attacks always flip reverse vectors

B. Faster bandwidth performance and increase in attack speed

C. Interrupt the remote victim's network traffic and reroute the packets to attackers machine

D. To hide the source IP address so that an attacker can hack without any legal corollary

Buy Now
Questions 7

Jeremy is web security consultant for Information Securitas. Jeremy has just been hired to perform contract work for a large state agency in Michigan. Jeremy's

first task is to scan all the company's external websites. Jeremy comes upon a login page which appears to allow employees access to sensitive areas on the

website. James types in the following statement in the username field:

SELECT * from Users where username='admin' ?AND password='' AND email like '%@testers.com%'

What will the SQL statement accomplish?

A. If the page is susceptible to SQL injection, it will look in the Users table for usernames of admin

B. This statement will look for users with the name of admin, blank passwords, and email addresses that end in @testers.com

C. This Select SQL statement will log James in if there are any users with NULL passwords

D. James will be able to see if there are any default user accounts in the SQL database

Buy Now
Questions 8

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

A. Sender's public key

B. Receiver's private key

C. Receiver's public key

D. Sender's private key

Buy Now
Questions 9

What statement is true regarding LM hashes?

A. LM hashes consist in 48 hexadecimal characters.

B. LM hashes are based on AES128 cryptographic standard.

C. Uppercase characters in the password are converted to lowercase.

D. LM hashes are not generated when the password length exceeds 15 characters.

Buy Now
Questions 10

What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

A. Passive

B. Reflective

C. Active

D. Distributive

Buy Now
Questions 11

Which of the following parameters enables NMAP's operating system detection feature?

A. NMAP -sV

B. NMAP -oS

C. NMAP -sR

D. NMAP -O

Buy Now
Questions 12

Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?

A. Sarbanes-Oxley Act (SOX)

B. Gramm-Leach-Bliley Act (GLBA)

C. Fair and Accurate Credit Transactions Act (FACTA)

D. Federal Information Security Management Act (FISMA)

Buy Now
Questions 13

Which set of access control solutions implements two-factor authentication?

A. USB token and PIN

B. Fingerprint scanner and retina scanner

C. Password and PIN

D. Account and password

Buy Now
Exam Code: 312-50V7
Exam Name: Ethical Hacking and Countermeasures (CEHv7)
Last Update: Apr 29, 2024
Questions: 514
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99