Free 312-49 Exam Braindumps (page: 37)

Page 36 of 133

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

  1. Closed
  2. Open
  3. Stealth
  4. Filtered

Answer(s): B



You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

  1. Packet filtering firewall
  2. Circuit-level proxy firewall
  3. Application-level proxy firewall
  4. Stateful firewall

Answer(s): D



Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

  1. Tracert
  2. Smurf scan
  3. Ping trace
  4. ICMP ping sweep

Answer(s): D



You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?

  1. Ping sweep
  2. Nmap
  3. Netcraft
  4. Dig

Answer(s): C






Post your Comments and Discuss EC-Council 312-49 exam with other Community members:

312-49 Discussions & Posts