Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions
Questions # 91:

During a recent security assessment, you discover the organization has one Domain Name Server (DNS) in a Demilitarized Zone (DMZ) and a second DNS server on the internal network.

What is this type of DNS configuration commonly called?

Options:

A.

Split DNS


B.

DNSSEC


C.

DynDNS


D.

DNS Scheme


Expert Solution
Questions # 92:

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client.

What is a possible source of this problem?

Options:

A.

The WAP does not recognize the client’s MAC address


B.

The client cannot see the SSID of the wireless network


C.

Client is configured for the wrong channel


D.

The wireless client is not configured to use DHCP


Expert Solution
Questions # 93:

Which type of antenna is used in wireless communication?

Options:

A.

Omnidirectional


B.

Parabolic


C.

Uni-directional


D.

Bi-directional


Expert Solution
Questions # 94:

A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?

Options:

A.

Man trap


B.

Tailgating


C.

Shoulder surfing


D.

Social engineering


Expert Solution
Questions # 95:

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

Options:

A.

Firewall-management policy


B.

Acceptable-use policy


C.

Remote-access policy


D.

Permissive policy


Expert Solution
Questions # 96:

In the software security development life cycle process, threat modeling occurs in which phase?

Options:

A.

Design


B.

Requirements


C.

Verification


D.

Implementation


Expert Solution
Questions # 97:

Which of the following is a symmetric cryptographic standard?

Options:

A.

DSA


B.

PKI


C.

RSA


D.

3DES


Expert Solution
Questions # 98:

Which type of scan measures a person's external features through a digital video camera?

Options:

A.

Iris scan


B.

Retinal scan


C.

Facial recognition scan


D.

Signature kinetics scan


Expert Solution
Questions # 99:

The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces which of the following vulnerabilities?

Options:

A.

An attacker, working slowly enough, can evade detection by the IDS.


B.

Network packets are dropped if the volume exceeds the threshold.


C.

Thresholding interferes with the IDS’ ability to reassemble fragmented packets.


D.

The IDS will not distinguish among packets originating from different sources.


Expert Solution
Questions # 100:

Which of the following resources does NMAP need to be used as a basic vulnerability scanner covering several vectors like SMB, HTTP and FTP?

Options:

A.

Metasploit scripting engine


B.

Nessus scripting engine


C.

NMAP scripting engine


D.

SAINT scripting engine


Expert Solution
Viewing page 10 out of 12 pages
Viewing questions 91-100 out of questions