Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?

Options:

A.

Perform a vulnerability scan of the system.


B.

Determine the impact of enabling the audit feature.


C.

Perform a cost/benefit analysis of the audit feature.


D.

Allocate funds for staffing of audit log review.


Expert Solution
Questions # 12:

The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:

Question # 12

What type of activity has been logged?

Options:

A.

Port scan targeting 192.168.1.103


B.

Teardrop attack targeting 192.168.1.106


C.

Denial of service attack targeting 192.168.1.103


D.

Port scan targeting 192.168.1.106


Expert Solution
Questions # 13:

A company has publicly hosted web applications and an internal Intranet protected by a firewall. Which technique will help protect against enumeration?

Options:

A.

Reject all invalid email received via SMTP.


B.

Allow full DNS zone transfers.


C.

Remove A records for internal hosts.


D.

Enable null session pipes.


Expert Solution
Questions # 14:

Least privilege is a security concept that requires that a user is

Options:

A.

limited to those functions required to do the job.


B.

given root or administrative privileges.


C.

trusted to keep all data and access to that data under their sole control.


D.

given privileges equal to everyone else in the department.


Expert Solution
Questions # 15:

The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106:

Question # 15

What is most likely taking place?

Options:

A.

Ping sweep of the 192.168.1.106 network


B.

Remote service brute force attempt


C.

Port scan of 192.168.1.106


D.

Denial of service attack on 192.168.1.106


Expert Solution
Questions # 16:

An NMAP scan of a server shows port 25 is open. What risk could this pose?

Options:

A.

Open printer sharing


B.

Web portal data leak


C.

Clear text authentication


D.

Active mail relay


Expert Solution
Questions # 17:

An NMAP scan of a server shows port 69 is open. What risk could this pose?

Options:

A.

Unauthenticated access


B.

Weak SSL version


C.

Cleartext login


D.

Web portal data leak


Expert Solution
Questions # 18:

What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?

Options:

A.

Proper testing


B.

Secure coding principles


C.

Systems security and architecture review


D.

Analysis of interrupts within the software


Expert Solution
Questions # 19:

What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

Options:

A.

Passive


B.

Reflective


C.

Active


D.

Distributive


Expert Solution
Questions # 20:

A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the bank's DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the bank's job postings (paying special attention to IT related jobs), and visiting the local dumpster for the bank's corporate office. What phase of the penetration test is the tester currently in?

Options:

A.

Information reporting


B.

Vulnerability assessment


C.

Active information gathering


D.

Passive information gathering


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions