Free 312-50v13 Exam Braindumps (page: 4)

Page 3 of 79

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

  1. [inurl:]
  2. [info:]
  3. [site:]
  4. [related:]

Answer(s): D



You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email.

Which stage of the cyber kill chain are you at?

  1. Reconnaissance
  2. Weaponization
  3. Command and control
  4. Exploitation

Answer(s): D



While performing an Nmap scan against a host, Paola determines the existence of a firewall.

In an attempt to determine whether the firewall is stateful or stateless, which of the following options would be best to use?

  1. -sA
  2. -sX
  3. -sT
  4. -sF

Answer(s): A



A newly joined employee, Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors.

What is the type of vulnerability assessment performed by Martin?

  1. Database assessment
  2. Host-based assessment
  3. Credentialed assessment
  4. Distributed assessment

Answer(s): B






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts