Free 312-50v11 Exam Braindumps (page: 12)

Page 12 of 127

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

  1. Exploration
  2. Investigation
  3. Reconnaissance
  4. Enumeration

Answer(s): C



Which of the following viruses tries to hide from anti-virus programs by actively altering and corrupting the chosen service call interruptions when they are being run?

  1. Macro virus
  2. Stealth/Tunneling virus
  3. Cavity virus
  4. Polymorphic virus

Answer(s): B



The “Gray-box testing” methodology enforces what kind of restriction?

  1. Only the external operation of a system is accessible to the tester.
  2. The internal operation of a system in only partly accessible to the tester.
  3. Only the internal operation of a system is known to the tester.
  4. The internal operation of a system is completely known to the tester.

Answer(s): B



When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?

  1. False negative
  2. True negative
  3. True positive
  4. False positive

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v11 exam with other Community members:

312-50v11 Exam Discussions & Posts