Latest ECCouncil 312-50v8 Real Exam Download 261-270

QUESTION 261
A security engineer is attempting to map a companyos internal network. The engineer enters in the following NMAP commanD.
NMAP Ƀn ɃsS ɃP0 Ƀp 80 ***.***.**.**
What type of scan is this?

A. Quick scan
B. Intense scan
C. Stealth scan
D. Comprehensive scan

Answer: 


QUESTION 262
Which of the following is a hashing algorithm?

A. MD5
B. PGP
C. DES
D. ROT13

Answer: 


QUESTION 263
Which of the following identifies the three modes in which.Snort can be configured to run?

A. Sniffer,Packet Logger,and Network Intrusion Detection System
B. Sniffer,Network Intrusion Detection System,and Host Intrusion Detection System
C. Sniffer,Host Intrusion Prevention System,and Network Intrusion Prevention System
D. Sniffer,Packet Logger,and Host Intrusion Prevention System

Answer: 


QUESTION 264
Which of the following is a common Service Oriented Architecture (SOA) vulnerability?

A. Cross-site scripting
B. SQL injection
C. VPath injection
D. XML denial of service issues

Answer: 


QUESTION 265
A company has.five different subnets: 192.168.1.0, 192.168.2.0, 192.168.3.0, 192.168.4.0 and
192.168.5.0. How can.NMAP be used.to scan these adjacent Class C networks?

A. NMAP.-P 192.168.1-5.
B. NMAP.-P 192.168.0.0/16
C. NMAP.-P 192.168.1.0,2.0,3.0,4.0,5.0
D. NMAP.-P 192.168.1/17

Answer: 


QUESTION 266
Which vital role does the U.S. Computer Security Incident Response Team (CSIRT) provide?

A. Incident response services to any user,company,government agency,or organization in partnership with the Department of Homeland Security
B. Maintenance of the nationos Internet infrastructure,builds out new Internet infrastructure,and decommissions old Internet infrastructure
C. Registration of critical penetration testing for the Department of Homeland Security and public and private sectors
D. Measurement of key vulnerability assessments on behalf of the Department of Defense (DOD) and State Department,as well as private sectors

Answer: 


QUESTION 267
When utilizing technical assessment methods to assess the security posture of a network, which of the following techniques would be most effective in determining whether end-user security training would be beneficial?

A. Vulnerability scanning
B. Social engineering
C. Application security testing
D. Network sniffing

Answer: 


QUESTION 268
What is the broadcast address for the subnet 190.86.168.0/22?

A. 190.86.168.255
B. 190.86.255.255
C. 190.86.171.255
D. 190.86.169.255

Answer: 


QUESTION 269
Which of the following are valid types of rootkits? (Choose three.)

A. Hypervisor level
B. Network level
C. Kernel level
D. Application level
E. Physical level
F. Data access level

Answer: A,C,D 


QUESTION 270
John the Ripper is a technical assessment tool used to test the weakness of which of the following?

A. Usernames
B. File permissions
C. Firewall rulesets
D. Passwords

Answer: 

Nhận xét