Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions
Questions # 101:

A newly discovered flaw in a software application would be considered which kind of security vulnerability?

Options:

A.

Input validation flaw


B.

HTTP header injection vulnerability


C.

0-day vulnerability


D.

Time-to-check to time-to-use flaw


Expert Solution
Questions # 102:

Which of the following examples best represents a logical or technical control?

Options:

A.

Security tokens


B.

Heating and air conditioning


C.

Smoke and fire alarms


D.

Corporate security policy


Expert Solution
Questions # 103:

A circuit level gateway works at which of the following layers of the OSI Model?

Options:

A.

Layer 5 - Application


B.

Layer 4 – TCP


C.

Layer 3 – Internet protocol


D.

Layer 2 – Data link


Expert Solution
Questions # 104:

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

Options:

A.

64 bit and CCMP


B.

128 bit and CRC


C.

128 bit and CCMP


D.

128 bit and TKIP


Expert Solution
Questions # 105:

The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?

Options:

A.

Asymmetric


B.

Confidential


C.

Symmetric


D.

Non-confidential


Expert Solution
Questions # 106:

Which property ensures that a hash function will not produce the same hashed value for two different messages?

Options:

A.

Collision resistance


B.

Bit length


C.

Key strength


D.

Entropy


Expert Solution
Questions # 107:

Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?

Options:

A.

Port scanning


B.

Banner grabbing


C.

Injecting arbitrary data


D.

Analyzing service response


Expert Solution
Questions # 108:

At a Windows Server command prompt, which command could be used to list the running services?

Options:

A.

Sc query type= running


B.

Sc query \\servername


C.

Sc query


D.

Sc config


Expert Solution
Questions # 109:

A security policy will be more accepted by employees if it is consistent and has the support of

Options:

A.

coworkers.


B.

executive management.


C.

the security officer.


D.

a supervisor.


Expert Solution
Questions # 110:

When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's computer to update the router configuration. What type of an alert is this?

Options:

A.

False positive


B.

False negative


C.

True positve


D.

True negative


Expert Solution
Viewing page 11 out of 12 pages
Viewing questions 101-110 out of questions