EC Council Practice Test 312-50
One of the Forbes 500 companies has been subjected to a large scale attack. You are one of the
shortlisted pen testers that they may hire. During the
interview with the CIO, he emphasiz
...
EC Council Practice Test 312-50
One of the Forbes 500 companies has been subjected to a large scale attack. You are one of the
shortlisted pen testers that they may hire. During the
interview with the CIO, he emphasized that he wants to totally eliminate all risks. What is one of
the first things you should do when hired?
A. Interview all employees in the company to rule out possible insider threats.
B. Establish attribution to suspected attackers.
C. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to
acceptable levels.
D. Start the Wireshark application to start sniffing network traffic. - ✔✔C
Which of the following is an NMAP script that could help detect HTTP Methods such as GET,
POST, HEAD, PUT, DELETE, TRACE?
A. http-git
B. http-headers
C. http enum
D. http-methods - ✔✔D
Which of the following is the most important phase of ethical hacking wherein you need to spend
considerable amount of time?
A. Gaining access
B. Escalating privileges
C. Network mapping
D. Footprinting - ✔✔D
It is a short-range wireless communication technology that allows mobile phones, computers and
other devices to connect and communicate. This technology
intends to replace cables connecting portable devices with high regards to security.
A. Bluetooth
B. Radio-Frequency Identification
C. WLAN
D. InfraRed - ✔✔A
Matthew received an email with an attachment named "YouWon$10Grand.zip." The zip file
contains a file named "HowToClaimYourPrize.docx.exe." Out of
excitement and curiosity, Matthew opened the said file. Without his knowledge, the file copies
itself to Matthew's APPDATA\IocaI directory and begins to beacon to
a Command-and-control server to download additional malicious binaries. What type of malware
has Matthew encountered?
A. Key-logger
B. Trojan
C. Worm
D. Macro Virus - ✔✔C
Which among the following is a Windows command that a hacker can use to list all the shares to
which the current user context has access?
A. NET FILE
B. NET USE
C. NET CONFIG
D. NET VIEW - ✔✔D
QUESTION 7
What is the approximate cost of replacement and recovery operation per year of a hard drive that
has a value of $300 given that the technician who charges
$10/hr would need 10 hours to restore OS and Software and needs further 4 hours to restore the
database from the last backup to the new hard disk? Calculate the
SLE, ARO, and ALE. Assume the EF = 1 (100%).
A. $440
B. $100
C. $1320
D. $146 - ✔✔D
QUESTION 8
Knowing the nature of backup tapes, which of the following is the MOST RECOMMENDED
way of storing backup tapes?
A. In a cool dry environment
B. Inside the data center for faster retrieval in a fireproof safe
C. In a climate controlled facility offsite
D. On a different floor in the same building - ✔✔C
Which of the following tools would MOST LIKELY be used to perform security audit on
various of forms of network systems?
A. Intrusion Detection System
B. Vulnerability scanner
C. Port scanner
D. Protocol analyzer - ✔✔B
Security and privacy of/on information systems are two entities that requires lawful regulations.
Which of the following regulations defines security and privacy
controls for Federal information systems and organizations?
A. NIST SP 800-53
B. PCI-DSS
C. EU Safe Harbor
D. HIPAA - ✔✔A
A big company, who wanted to test their security infrastructure, wants to hire elite pen testers
like you. During the interview, they asked you to show sample
reports from previous penetration tests. What should you do?
A. Share reports, after NDA is signed
B. Share full reports, not redacted
C. Decline but, provide references
D. Share full reports with redactions - ✔✔D
You are about to be hired by a well known Bank to perform penetration tests. Which of the
following documents describes the specifics of the testing, the
associated violations, and essentially protects both the bank's interest and your liabilities as a
tester?
A. Service Level Agreement
B. Non-Disclosure Agreement
C. Terms of Engagement
D. Project Scope - ✔✔C
The practical realities facing organizations today make risk response strategies essential. Which
of the following is NOT one of the five basic responses to
risk?
A. Accept
B. Mitigate
C. Delegate
D. Avoid - ✔✔C
A company recently hired your team of Ethical Hackers to test the security of their network
systems. The company wants to have the attack be as realistic as
possible. They did not provide any information besides the name of their company. What phase
of security testing would your team jump in right away?
A. Scanning
B. Reconnaissance
C. Escalation
D. Enumeration - ✔✔B
TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote
device during standard layer 4 network communications. Which
of the following tools can be used for passive OS fingerprinting?
A. nmap
B. ping
C. tracert
D. tcpdump - ✔✔D
The chance of a hard drive failure is known to be once every four years. The cost of a new hard
drive is $500. EF (Exposure Factor) is about 0.5. Calculate
for the Annualized Loss Expectancy (ALE).
A. $62.5
B. $250
C. $125
D. $65.2 - ✔✔A
backups?
A. A backup is the source of Malware or illicit information
B. A backup is incomplete because no verification was performed
C. A backup is unavailable during disaster recovery
D. An unencrypted backup can be misplaced or stolen - ✔✔D
What kind of risk will remain even if all theoretically possible safety measures would be
applied?
A. Residual risk
B. Inherent risk
C. Impact risk
D. Deferred risk - ✔✔A
While doing a Black box pen test via the TCP port (80), you noticed that the traffic gets blocked
when you tried to pass IRC traffic from a web enabled host.
However, you also noticed that outbound HTTP traffic is being allowed. What type of firewall is
being utilized for the outbound traffic?
A. Stateful
B. Application
C. Circuit
D. Packet Filtering - ✔✔B
It is a widely used standard for messag
[Show More]