Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?


A.     signverif.exe

B.     sigverif.exe

C.     msverif.exe

D.     verifier.exe


Correct Answer: B




Botnets are networks of compromised computers that are controlled remotely and

surreptitiously by one or more cyber criminals. How do cyber criminals infect a victim’s computer with bots? (Select 4 answers)


A.     Attackers physically visit every victim’s computer to infect them with malicious software.

B.     Home computers that have security vulnerabilities are prime targets for botnets.

C.     Spammers scan the Internet looking for computers that are unprotected and use these “opendoors” to install malicious software.

D.     Attackers use phishing or spam emails that contain links or attachments.

E.      Attackers use websites to host the bots utilizing Web Browser vulnerabilities.


Correct Answer: BCDE




What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?


A.     The ethical hacker does not use the same techniques or skills as a cracker.

B.     The ethical hacker does it strictly for financial motives unlike a cracker.

C.     The ethical hacker has authorization from the owner of the target.

D.     The ethical hacker is just a cracker who is getting paid.


Correct Answer: C




What does the term “Ethical Hacking” mean?


A.     Someone who is hacking for ethical reasons.

B.     Someone who is using his/her skills for ethical reasons.

C.     Someone who is using his/her skills for defensive purposes.

D.     Someone who is using his/her skills for offensive purposes.


Correct Answer: C




Who is an Ethical Hacker?


A.     A person who hacks for ethical reasons.

B.     A person who hacks for an ethical cause.

C.     A person who hacks for defensive purposes.

D.     A person who hacks for offensive purposes.


Correct Answer: C




What is “Hacktivism”?


A.     Hacking for a cause.

B.     Hacking ruthlessly.

C.     An association which groups activists.

D.     None of the above.


Correct Answer: A




Where a security tester should be looking for information that could be used by an attacker against an organization? (Select all that apply)


A.     CHAT rooms

B.     WHOIS database

C.     News groups

D.     Web sites

E.      Search engines

F.      Organization’s own web site


Correct Answer: ABCDEF




What are the two basic types of attacks? (Choose two.)


A.     DoS

B.     Passive

C.     Sniffing

D.     Active

E.      Cracking

Correct Answer: BD




User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?


A.     18 U.S.C 1029 Possession of Access Devices.

B.     18 U.S.C 1030 Fraud and related activity in connection with computers.

C.     18 U.S.C 1343 Fraud by wire, radio or television.

D.     18 U.S.C 1361 Injury to Government Property.

E.      18 U.S.C 1362 Government communication systems.

F.      18 U.S.C 1831 Economic Espionage Act.

G.     18 U.S.C 1832 Trade Secrets Act.


Correct Answer: B




Which of the following activities will NOT be considered as passive footprinting?


A.     Go through the rubbish to find out any information that might have been discarded.

B.     Search on financial site such as Yahoo Financial to identify assets.

C.     Scan the range of IP address found in the target DNS database.

D.     Perform multiples queries using a search engine.


Correct Answer: C


Free VCE & PDF File for ECCouncil 312-50 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.