[Free] 2019(Nov) EnsurePass ECCouncil 712-50 Dumps with VCE and PDF 251-260

Get Full Version of the Exam

Question No.251

SQL injection is a very popular and successful injection attack method. Identify the basic SQL injection text:

A. ` o 1=1 – –

B. /../../../../


  2. NOPS

Correct Answer: A

Question No.252

An anonymity network is a series of?

  1. Covert government networks

  2. War driving maps

  3. Government networks in Tora

  4. Virtual network tunnels

Correct Answer: D

Question No.253

Network Forensics is the prerequisite for any successful legal action after attacks on your Enterprise Network. Which is the single most important factor to introducing digital evidence into a court of law?

  1. Comprehensive Log-Files from all servers and network devices affected during the attack

  2. Fully trained network forensic experts to analyze all data right after the attack

  3. Uninterrupted Chain of Custody

  4. Expert forensics witness

Correct Answer: C

Question No.254

Which of the following is MOST important when tuning an Intrusion Detection System (IDS)?

  1. Trusted and untrusted networks

  2. Type of authentication

  3. Storage encryption

  4. Log retention

Correct Answer: A

Question No.255

In terms of supporting a forensic investigation, it is now imperative that managers, first- responders, etc., accomplish the following actions to the computer under investigation:

  1. Secure the area and shut-down the computer until investigators arrive

  2. Secure the area and attempt to maintain power until investigators arrive

  3. Immediately place hard drive and other components in an anti-static bag

  4. Secure the area.

Correct Answer: B

Question No.256

Which wireless encryption technology makes use of temporal keys?

  1. Wireless Application Protocol (WAP)

  2. Wifi Protected Access version 2 (WPA2)

  3. Wireless Equivalence Protocol (WEP)

  4. Extensible Authentication Protocol (EAP)

Correct Answer: B

Question No.257

An access point (AP) is discovered using Wireless Equivalent Protocol (WEP). The ciphertext sent by the AP is encrypted with the same key and cipher used by its stations. What authentication method is being used?

  1. Shared key

  2. Asynchronous

  3. Open

  4. None

Correct Answer: A

Question No.258

The general ledger setup function in an enterprise resource package allows for setting accounting periods. Access to this function has been permitted to users in finance, the shipping department, and production scheduling. What is the most likely reason for such broad access?

  1. The need to change accounting periods on a regular basis.

  2. The requirement to post entries for a closed accounting period.

  3. The need to create and modify the chart of accounts and its allocations.

  4. The lack of policies and procedures for the proper segregation of duties.

Correct Answer: D

Question No.259

Which of the following is a symmetric encryption algorithm?

  1. 3DES

  2. MD5

  3. ECC

  4. RSA

Correct Answer: A

Question No.260

Security related breaches are assessed and contained through which of the following?

  1. The IT support team.

  2. A forensic analysis.

  3. Incident response

  4. Physical security team.

Correct Answer: C

Get Full Version of the Exam
712-50 Dumps
712-50 VCE and PDF