Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions
Questions # 111:

What is the most secure way to mitigate the theft of corporate information from a laptop that was left in a hotel room?

Options:

A.

Set a BIOS password.


B.

Encrypt the data on the hard drive.


C.

Use a strong logon password to the operating system.


D.

Back up everything on the laptop and store the backup in a safe place.


Expert Solution
Questions # 112:

What is the main advantage that a network-based IDS/IPS system has over a host-based solution?

Options:

A.

They do not use host system resources.


B.

They are placed at the boundary, allowing them to inspect all traffic.


C.

They are easier to install and configure.


D.

They will not interfere with user interfaces.


Expert Solution
Questions # 113:

A pentester gains access to a Windows application server and needs to determine the settings of the built-in Windows firewall. Which command would be used?

Options:

A.

Netsh firewall show config


B.

WMIC firewall show config


C.

Net firewall show config


D.

Ipconfig firewall show config


Expert Solution
Questions # 114:

Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?

Options:

A.

Cross-site scripting


B.

SQL injection


C.

Missing patches


D.

CRLF injection


Expert Solution
Questions # 115:

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

Options:

A.

Man-in-the-middle attack


B.

Brute-force attack


C.

Dictionary attack


D.

Session hijacking


Expert Solution
Viewing page 12 out of 12 pages
Viewing questions 111-120 out of questions