Free EC-Council 312-50v12 Exam Braindumps (page: 13)

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing – Reports https://ibt1.prometric.com/users/custom/report_queue/rq_str... corporate network. What tool should the analyst use to perform a Blackjacking attack?

  1. Paros Proxy
  2. BBProxy
  3. Blooover
  4. BBCrack

Answer(s): B



When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, PUT, DELETE, TRACE) using NMAP script engine. What Nmap script will help you with this task?

  1. http-methods
  2. http enum
  3. http-headers
  4. http-git

Answer(s): A



Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

  1. A biometric system that bases authentication decisions on behavioral attributes.
  2. A biometric system that bases authentication decisions on physical attributes.
  3. An authentication system that creates one-time passwords that are encrypted with secret keys.
  4. An authentication system that uses passphrases that are converted into virtual passwords.

Answer(s): C



Which of the following is a low-tech way of gaining unauthorized access to systems?

  1. Social Engineering
  2. Eavesdropping
  3. Scanning
  4. Sniffing

Answer(s): A






Post your Comments and Discuss EC-Council 312-50v12 exam prep with other Community members:

312-50v12 Exam Discussions & Posts