[2021.1] ECCouncil 312-50V10 practice test

Welcome to your [2021.1] ECCouncil 312-50V10 practice test

QUESTION 1

Which of the following is an example of two-factor authentication?

QUESTION 2

Which protocol and the port number might be needed in order to send log messages to a log analysis tool that resides
behind a firewall?

QUESTION 3

The precaution of prohibiting employees from bringing personal computing devices into a facility is what type of security
control?

QUESTION 4

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

QUESTION 5

Fred is the network administrator for his company. Fred is testing an internal switch.
From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session
with his computer. How can Fred accomplish this?

QUESTION 6

Your team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as
possible; therefore, they did not provide any information besides the company name. What should be the first step in
security testing the client?

QUESTION 7

Your next-door neighbor, that you do not get along with, is having issues with their network, so he yells to his spouse the
network\\’s SSID and password and you hear them both clearly. What do you do with this information?

QUESTION 8

One of your team members has asked you to analyze the following SOA record. What is the version?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)

QUESTION 9

In many states sending spam is illegal. Thus, the spammers have techniques to try and ensure that no one knows they
sent the spam out to thousands of users at a time. Which of the following best describes what spammers use to hide the
origin of these types of e-mails?

QUESTION 10

Which of the following is the greatest threat posed by backups?

QUESTION 11

An attacker gains access to a Web server\\’s database and displays the contents of the table that holds all of the names,
passwords, and other user information. The attacker did this by entering information into the Web site\\’s user login page
that the software\\’s designers did not expect to be entered. This is an example of what kind of software design
problem?

QUESTION 12

You are using NMAP to resolve domain names into IP addresses for a ping sweep later. Which of the following commands look for IP addresses?

QUESTION 13

Which of the following is a hashing algorithm?