Eccouncil 312-50v10 Exam Material | 312-50v10 Dumps PDF | Dumpspass4sure
SAMPLE QUESTIONS:
Question No. 1
Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?
A. Ping of death
B. SYN flooding
C. TCP hijacking
D. Smurf attack
ANSWER : A
Question No. 2
Which of the following is a common Service Oriented Architecture (SOA) vulnerability?
A. Cross-site scripting
B. SQL injection
C. VPath injection
D. XML denial of service issues
ANSWER : D
Question No. 3
In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities. Example: allintitle: root passwd
A. Maintaining Access
B. Gaining Access
C. Reconnaissance
D. Scanning and Enumeration
ANSWER : C
Question No. 4
During an Xmas scan what indicates a port is closed?
A. No return response
B. RST
C. ACK
D. SYN
ANSWER : B
Question No. 5
_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.
A. Trojan
B. RootKit
C. DoS tool
D. Scanner
E. Backdoor
ANSWER : B
FOR MORE INFORMATION
VISIT NOW:
Comments
Post a Comment