Ensurepass

QUESTION 511

Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?

 

A.     signverif.exe

B.     sigverif.exe

C.     msverif.exe

D.     verifier.exe

 

Correct Answer: B

 

 

QUESTION 512

Botnets are networks of compromised computers that are controlled remotely and

surreptitiously by one or more cyber criminals. How do cyber criminals infect a victim’s computer with bots? (Select 4 answers)

 

A.     Attackers physically visit every victim’s computer to infect them with malicious software.

B.     Home computers that have security vulnerabilities are prime targets for botnets.

C.     Spammers scan the Internet looking for computers that are unprotected and use these “opendoors” to install malicious software.

D.     Attackers use phishing or spam emails that contain links or attachments.

E.      Attackers use websites to host the bots utilizing Web Browser vulnerabilities.

 

Correct Answer: BCDE

 

 

QUESTION 513

What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?

 

A.     The ethical hacker does not use the same techniques or skills as a cracker.

B.     The ethical hacker does it strictly for financial motives unlike a cracker.

C.     The ethical hacker has authorization from the owner of the target.

D.     The ethical hacker is just a cracker who is getting paid.

 

Correct Answer: C

 

 

QUESTION 514

What does the term “Ethical Hacking” mean?

 

A.     Someone who is hacking for ethical reasons.

B.     Someone who is using his/her skills for ethical reasons.

C.     Someone who is using his/her skills for defensive purposes.

D.     Someone who is using his/her skills for offensive purposes.

 

Correct Answer: C

 

 

QUESTION 515

Who is an Ethical Hacker?

 

A.     A person who hacks for ethical reasons.

B.     A person who hacks for an ethical cause.

C.     A person who hacks for defensive purposes.

D.     A person who hacks for offensive purposes.

 

Correct Answer: C

 

 

QUESTION 516

What is “Hacktivism”?

 

A.     Hacking for a cause.

B.     Hacking ruthlessly.

C.     An association which groups activists.

D.     None of the above.

 

Correct Answer: A

 

 

QUESTION 517

Where a security tester should be looking for information that could be used by an attacker against an organization? (Select all that apply)

 

A.     CHAT rooms

B.     WHOIS database

C.     News groups

D.     Web sites

E.      Search engines

F.      Organization’s own web site

 

Correct Answer: ABCDEF

 

 

QUESTION 518

What are the two basic types of attacks? (Choose two.)

 

A.     DoS

B.     Passive

C.     Sniffing

D.     Active

E.      Cracking

Correct Answer: BD

 

 

QUESTION 519

User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

 

A.     18 U.S.C 1029 Possession of Access Devices.

B.     18 U.S.C 1030 Fraud and related activity in connection with computers.

C.     18 U.S.C 1343 Fraud by wire, radio or television.

D.     18 U.S.C 1361 Injury to Government Property.

E.      18 U.S.C 1362 Government communication systems.

F.      18 U.S.C 1831 Economic Espionage Act.

G.     18 U.S.C 1832 Trade Secrets Act.

 

Correct Answer: B

 

 

QUESTION 520

Which of the following activities will NOT be considered as passive footprinting?

 

A.     Go through the rubbish to find out any information that might have been discarded.

B.     Search on financial site such as Yahoo Financial to identify assets.

C.     Scan the range of IP address found in the target DNS database.

D.     Perform multiples queries using a search engine.

 

Correct Answer: C

 

Free VCE & PDF File for ECCouncil 312-50 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.