ECCouncil 312-50v9 - Certified Ethical Hacker Exam V9 Exam

Page:    1 / 25   
Total 125 questions

You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from the server will not be caught by a Network Based Intrusion
Detection System (NIDS).
Which is the best way to evade the NIDS?

  • A. Out of band signaling
  • B. Encryption
  • C. Alternate Data Streams
  • D. Protocol Isolation


Answer : B

Which of the following incident handling process phases is responsible for defining rules, creating a back-up plan, and testing the plans for an enterprise?

  • A. Preparation phase
  • B. Recovery phase
  • C. Identification phase
  • D. Containment phase


Answer : A

The purpose of a ____________ is to deny network access to local area networks and other information assets by unauthorized wireless devices.

  • A. Wireless Access Point
  • B. Wireless Analyzer
  • C. Wireless Access Control list
  • D. Wireless Intrusion Prevention System


Answer : D

Your company was hired by a small healthcare provider to perform a technical assessment on the network.
What is the best approach for discovering vulnerabilities on a Windows-based computer?

  • A. Use the built-in Windows Update tool
  • B. Create a disk imageof a clean Windows installation
  • C. Check MITRE.org for the latest list of CVE findings
  • D. Used a scan tool like Nessus


Answer : D

Jimmy is standing outside a secure entrance to a facility. He is pretending to having a tense conversation on his cell phone as an authorized employee badges in. Jimmy, while still on the phone, grabs the door as it beginsto close.
What just happened?

  • A. Masquading
  • B. Phishing
  • C. Whaling
  • D. Piggybacking


Answer : D

Page:    1 / 25   
Total 125 questions