ECCouncil 312-50 - Ethical Hacking and Countermeasures Exam

Question #6 (Topic: Background)
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
A. Network firewalls can prevent attacks because they can detect malicious HTTP traffic. B. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened. C. Network firewalls can prevent attacks if they are properly configured. D. Network firewalls cannot prevent attacks because they are too complex to configure.
Answer: B
Question #7 (Topic: Background)
Which of the following programs is usually targeted at Microsoft Office products?
A. Polymorphic virus B. Multipart virus C. Macro virus D. Stealth virus
Answer: C
Question #8 (Topic: Background)
Bluetooth uses which digital modulation technique to exchange information between paired devices?
A. PSK (phase-shift keying) B. FSK (frequency-shift keying) C. ASK (amplitude-shift keying) D. QAM (quadrature amplitude modulation)
Answer: A
Question #9 (Topic: Background)
In order to show improvement of security over time, what must be developed?
A. Reports B. Testing tools C. Metrics D. Taxonomy of vulnerabilities
Answer: C
Question #10 (Topic: Analysis/Assessment)
Passive reconnaissance involves collecting information through which of the following?
A. Social engineering B. Network traffic sniffing C. Man in the middle attacks D. Publicly accessible sources
Answer: D
Download Exam
Page: 2 / 123
Total 614 questions