Pass the ECCouncil CHFIv9 312-49v9 Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions
Questions # 31:

You work as a penetration tester for Hammond Security Consultants. You are currently working on a contract for the state government of California. Your next step is to initiate a DoS attack on their network. Why would you want to initiate a DoS attack on a system you are testing?

Options:

A.

Show outdated equipment so it can be replaced


B.

List weak points on their network


C.

Use attack as a launching point to penetrate deeper into the network


D.

Demonstrate that no system can be protected against DoS attacks


Expert Solution
Questions # 32:

Which part of the Windows Registry contains the user's password file?

Options:

A.

HKEY_LOCAL_MACHINE


B.

HKEY_CURRENT_CONFIGURATION


C.

HKEY_USER


D.

HKEY_CURRENT_USER


Expert Solution
Questions # 33:

You are the network administrator for a small bank in Dallas, Texas. To ensure network security, you enact a security policy that requires all users to have 14 character passwords. After giving your users 2 weeks notice, you change the Group Policy to force 14 character passwords. A week later you dump the SAM database from the standalone server and run a password-cracking tool against it. Over 99% of the passwords are broken within an hour. Why were these passwords cracked so Quickly?

Options:

A.

Passwords of 14 characters or less are broken up into two 7-character hashes


B.

A password Group Policy change takes at least 3 weeks to completely replicate throughout a network


C.

Networks using Active Directory never use SAM databases so the SAM database pulled was empty


D.

The passwords that were cracked are local accounts on the Domain Controller


Expert Solution
Questions # 34:

What will the following command accomplish?

Options:

A.

Test ability of a router to handle over-sized packets


B.

Test the ability of a router to handle under-sized packets


C.

Test the ability of a WLAN to handle fragmented packets


D.

Test the ability of a router to handle fragmented packets


Expert Solution
Questions # 35:

Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

Options:

A.

Send DOS commands to crash the DNS servers


B.

Perform DNS poisoning


C.

Perform a zone transfer


D.

Enumerate all the users in the domain


Expert Solution
Questions # 36:

You work as an IT security auditor hired by a law firm in Boston to test whether you can gain access to sensitive information about the company clients. You have rummaged through their trash and found very little information. You do not want to set off any alarms on their network, so you plan on performing passive foot printing against their Web servers. What tool should you use?

Options:

A.

Ping sweep


B.

Nmap


C.

Netcraft


D.

Dig


Expert Solution
Questions # 37:

You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

Options:

A.

ARP Poisoning


B.

DNS Poisoning


C.

HTTP redirect attack


D.

IP Spoofing


Expert Solution
Questions # 38:

If you plan to startup a suspect's computer, you must modify the ___________ to ensure that you do not contaminate or alter data on the suspect's hard drive by booting to the hard drive.

Options:

A.

deltree command


B.

CMOS


C.

Boot.sys


D.

Scandisk utility


Expert Solution
Questions # 39:

When you carve an image, recovering the image depends on which of the following skills?

Options:

A.

Recognizing the pattern of the header content


B.

Recovering the image from a tape backup


C.

Recognizing the pattern of a corrupt file


D.

Recovering the image from the tape backup


Expert Solution
Questions # 40:

You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls? (Choose two.)

Options:

A.

162


B.

161


C.

163


D.

160


Expert Solution
Questions # 41:

Michael works for Kimball Construction Company as senior security analyst. As part of yearly security audit, Michael scans his network for vulnerabilities. Using Nmap, Michael conducts XMAS scan and most of the ports scanned do not give a response. In what state are these ports?

Options:

A.

Closed


B.

Open


C.

Stealth


D.

Filtered


Expert Solution
Questions # 42:

What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somehwere.com'; DROP TABLE members; --'

Options:

A.

Deletes the entire members table


B.

Inserts the Error! Reference source not found.email address into the members table


C.

Retrieves the password for the first user in the members table


D.

This command will not produce anything since the syntax is incorrect


Expert Solution
Questions # 43:

Which Intrusion Detection System (IDS) usually produces the most false alarms due to the unpredictable behaviors of users and networks?

Options:

A.

network-based IDS systems (NIDS)


B.

host-based IDS systems (HIDS)


C.

anomaly detection


D.

signature recognition


Expert Solution
Questions # 44:

If an attacker's computer sends an IPID of 31400 to a zombie computer on an open port in IDLE scanning, what will be the response?

Options:

A.

The zombie will not send a response


B.

31402


C.

31399


D.

31401


Expert Solution
Questions # 45:

Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

Options:

A.

Tailgating


B.

Backtrapping


C.

Man trap attack


D.

Fuzzing


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions