Free EC-Council 312-50v12 Exam Braindumps (page: 17)

An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?

  1. He will create a SPAN entry on the spoofed root bridge and redirect traffic to his computer.
  2. He will activate OSPF on the spoofed root bridge.
  3. He will repeat this action so that it escalates to a DoS attack.
  4. He will repeat the same attack against all L2 switches of the network.

Answer(s): A



You have gained physical access to a Windows 2008 R2 server, which has an accessible disc drive. When you attempt to boot the server and log in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s password or activate disabled Windows accounts?

  1. John the Ripper
  2. SET
  3. CHNTPW
  4. Cain & Abel

Answer(s): C



What does a firewall check to prevent particular ports and applications from getting packets into an organization?

  1. Transport layer port numbers and application layer headers
  2. Presentation layer headers and the session layer port numbers
  3. Network layer headers and the session layer port numbers
  4. Application layer port numbers and the transport layer headers

Answer(s): A



An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site.

Which file does the attacker need to modify?

  1. Boot.ini
  2. Sudoers
  3. Networks
  4. Hosts

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v12 exam prep with other Community members:

312-50v12 Exam Discussions & Posts