Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 89 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 89
Topic #: 1
[All 312-50v12 Questions]

Attacker Rony installed a rogue access point within an organization’s perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack.
What is the type of vulnerability assessment performed by Johnson in the above scenario?

  • A. Wireless network assessment
  • B. Application assessment
  • C. Host-based assessment
  • D. Distributed assessment
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
eli117
Highly Voted 1 year, 7 months ago
Selected Answer: A
The answer is A. Wireless network assessment. Johnson identified unusual traffic in the internal network that is aimed at cracking the authentication mechanism, which suggests that there might be a rogue access point within the organization's perimeter. As a security auditor, Johnson immediately turned off the targeted network and performed a wireless network assessment to identify any weak and outdated security mechanisms that are open to attack.
upvoted 5 times
victorfs
1 year, 6 months ago
I think is B opción. Application assesment
upvoted 1 times
...
...
duke_of_kamulu
Most Recent 9 months, 1 week ago
A is the answer CEHv12 pg 553 APP-Tests and analyzes all elements of the web infrastructure for any misconfiguration, outdated content, or known vulnerabilities
upvoted 2 times
...
insaniunt
11 months ago
Selected Answer: A
A. Wireless network assessment. "Determines possible network security attacks that may occur on the organization’s system" CEH v12 book, page 553
upvoted 2 times
...
IPconfig
1 year ago
Selected Answer: B
Application Assessment Tests and analyses all elements of the web infrastructure for any misconfiguration, outdated content, or known vulnerabilities CEH V12 Page 553
upvoted 1 times
IPconfig
1 year ago
"He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack."
upvoted 1 times
I_Know_Everything_KY
9 months, 1 week ago
You pivot from "web infrastructure" to "targeted network" in your 2 posts. The answer is A: Wireless network assessment.
upvoted 2 times
...
...
...
kunnu
1 year, 2 months ago
Answer is A - Wireless Network Assessment, CEH v12 book page 555/2113
upvoted 2 times
...
SailOn
1 year, 2 months ago
this is a tricky question as the clue to the answer lies in the 'turned off the target network', meaning the auditor know it's a wireless attack, and so would choose to do a wireless network assessment. It is not application assessment as in the CEH course book, it is specifically defined at assessment on web infrastructure. It could be host-based due to the mention of outdated security mechanisms. But due to the fact the auditor knows it's a wireless attack, A would be the best answer
upvoted 2 times
...
ZacharyDriver
1 year, 4 months ago
Selected Answer: A
A. Wireless Network Assessment
upvoted 2 times
...
Vincent_Lu
1 year, 5 months ago
Selected Answer: C
C. Host-based assessment Because Johnson must focus on authentication mechanism, and which should be belonging to the scope of "C. Host-based assessment"
upvoted 1 times
...
victorfs
1 year, 6 months ago
Selected Answer: B
The correct opción is B B. Application assessment Where is te wireless Network here? Johnson's approach of shutting down the target network and testing for any weak and outdated security mechanisms indicates a more general assessment focused on applications and systems, rather than a specific evaluation of wireless networks. Johnson's goal is to identify weaknesses in authentication mechanisms and potential vulnerabilities in applications or systems that could allow for an attack.
upvoted 2 times
SoloMaan
11 months, 3 weeks ago
I think Rogue access point is wireless.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...