Free EC-Council 312-50v12 Exam Braindumps (page: 14)

Which system consists of a publicly available set of databases that contain domain name registration contact information?

  1. WHOIS
  2. CAPTCHA
  3. IANA
  4. IETF

Answer(s): A



Why is a penetration test considered to be more thorough than vulnerability scan?

  1. Vulnerability scans only do host discovery and port scanning by default.
  2. A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.
  3. It is not – a penetration test is often performed by an automated tool, while a vulnerability scan requiresactive engagement.
  4. The tools used by penetration testers tend to have much more comprehensive vulnerability databases.

Answer(s): B



Bob received this text message on his mobile phone: “Hello, this is Scott Smelby from the Yahoo Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com”. Which statement below is true?

  1. This is a scam as everybody can get a @yahoo address, not the Yahoo customer service employees.
  2. This is a scam because Bob does not know Scott.
  3. Bob should write to scottmelby@yahoo.com to verify the identity of Scott.
  4. This is probably a legitimate message as it comes from a respectable organization.

Answer(s): A



env x=’(){ :;};echo exploit’ bash –c ‘cat/etc/passwd’

What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

  1. Removes the passwd file
  2. Changes all passwords in passwd
  3. Add new user to the passwd file
  4. Display passwd content to prompt

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v12 exam prep with other Community members:

312-50v12 Exam Discussions & Posts