Free 312-39 Exam Braindumps (page: 3)

Page 2 of 26

Which of the following command is used to enable logging in iptables?

  1. $ iptables -B INPUT -j LOG
  2. $ iptables -A OUTPUT -j LOG
  3. $ iptables -A INPUT -j LOG
  4. $ iptables -B OUTPUT -j LOG

Answer(s): B


Reference:

https://tecadmin.net/enable-logging-in-iptables-on-linux/



Ray is a SOC analyst in a company named Queens Tech. One Day, Queens Tech is affected by a DoS/DDoS attack. For the containment of this incident, Ray and his team are trying to provide additional bandwidth to the network devices and increasing the capacity of the servers.

What is Ray and his team doing?

  1. Blocking the Attacks
  2. Diverting the Traffic
  3. Degrading the services
  4. Absorbing the Attack

Answer(s): D



Identify the attack when an attacker by several trial and error can read the contents of a password file present in the restricted etc folder just by manipulating the URL in the browser as shown:

http://www.terabytes.com/process.php./../../../../etc/passwd

  1. Directory Traversal Attack
  2. SQL Injection Attack
  3. Denial-of-Service Attack
  4. Form Tampering Attack

Answer(s): B


Reference:

https://doc.lagout.org/security/SQL%20Injection%20Attacks%20and%20Defense.pdf



Which encoding replaces unusual ASCII characters with "%" followed by the character’s two-digit ASCII code expressed in hexadecimal?

  1. Unicode Encoding
  2. UTF Encoding
  3. Base64 Encoding
  4. URL Encoding

Answer(s): D


Reference:

https://ktflash.gitbooks.io/ceh_v9/content/125_countermeasures.html






Post your Comments and Discuss EC-Council 312-39 exam with other Community members:

312-39 Discussions & Posts