EC-Council 312-50v8 Exam Practice Questions (P. 1)
- Full Access (357 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
- AFast processor to help with network traffic analysis
- BThey must be dual-homed
- CSimilar RAM requirements
- DFast network interface cards
Correct Answer:
B
B
send
light_mode
delete
Question #2
Which of the following is an application that requires a host application for replication?
send
light_mode
delete
Question #3
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
send
light_mode
delete
Question #4
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
- ARestore a random file.
- BPerform a full restore.
- CRead the first 512 bytes of the tape.
- DRead the last 512 bytes of the tape.
Correct Answer:
B
B
send
light_mode
delete
Question #5
Which of the following describes the characteristics of a Boot Sector Virus?
- AMoves the MBR to another location on the RAM and copies itself to the original location of the MBR
- BMoves the MBR to another location on the hard disk and copies itself to the original location of the MBR
- CModifies directory table entries so that directory entries point to the virus code instead of the actual program
- DOverwrites the original MBR and only executes the new virus code
Correct Answer:
B
B
send
light_mode
delete
Question #6
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
- ANetwork firewalls can prevent attacks because they can detect malicious HTTP traffic.
- BNetwork firewalls cannot prevent attacks because ports 80 and 443 must be opened.
- CNetwork firewalls can prevent attacks if they are properly configured.
- DNetwork firewalls cannot prevent attacks because they are too complex to configure.
Correct Answer:
B
B
send
light_mode
delete
Question #7
Which of the following programs is usually targeted at Microsoft Office products?
send
light_mode
delete
Question #8
Bluetooth uses which digital modulation technique to exchange information between paired devices?
- APSK (phase-shift keying)
- BFSK (frequency-shift keying)
- CASK (amplitude-shift keying)
- DQAM (quadrature amplitude modulation)
Correct Answer:
A
A
send
light_mode
delete
Question #9
In order to show improvement of security over time, what must be developed?
send
light_mode
delete
Question #10
Passive reconnaissance involves collecting information through which of the following?
- ASocial engineering
- BNetwork traffic sniffing
- CMan in the middle attacks
- DPublicly accessible sources
Correct Answer:
D
D
send
light_mode
delete
All Pages