Free 312-50v13 Exam Braindumps (page: 8)

Page 7 of 79

Bob, an attacker, has managed to access a target IoT device. He employed an online tool to gather information related to the model of the IoT device and the certifications granted to it.

Which of the following tools did Bob employ to gather the above information?

  1. FCC ID search
  2. Google image search
  3. search.com
  4. EarthExplorer

Answer(s): A



What piece of hardware on a computer’s motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

  1. CPU
  2. UEFI
  3. GPU
  4. TPM

Answer(s): D



Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the integrity of updating and changing data. For this purpose, he uses a web service that uses HTTP methods such as PUT, POST, GET, and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application.

What is the type of web-service API mentioned in the above scenario?

  1. RESTful API
  2. JSON-RPC
  3. SOAP API
  4. REST API

Answer(s): A



To create a botnet, the attacker can use several techniques to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.

Which technique is discussed here?

  1. Subnet scanning technique
  2. Permutation scanning technique
  3. Hit-list scanning technique.
  4. Topological scanning technique

Answer(s): D






Post your Comments and Discuss EC-Council 312-50v13 exam with other Community members:

312-50v13 Exam Discussions & Posts