Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions
Questions # 21:

A penetration tester is hired to do a risk assessment of a company's DMZ. The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems. What kind of test is being performed?

Options:

A.

white box


B.

grey box


C.

red box


D.

black box


Expert Solution
Questions # 22:

Which system consists of a publicly available set of databases that contain domain name registration contact information?

Options:

A.

WHOIS


B.

IANA


C.

CAPTCHA


D.

IETF


Expert Solution
Questions # 23:

Which results will be returned with the following Google search query?

site:target.com -site:Marketing.target.com accounting

Options:

A.

Results matching all words in the query


B.

Results matching “accounting” in domain target.com but not on the site Marketing.target.com


C.

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting


D.

Results for matches on target.com and Marketing.target.com that include the word “accounting”


Expert Solution
Questions # 24:

Which of the following levels of algorithms does Public Key Infrastructure (PKI) use?

Options:

A.

RSA 1024 bit strength


B.

AES 1024 bit strength


C.

RSA 512 bit strength


D.

AES 512 bit strength


Expert Solution
Questions # 25:

While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site:

<script>alert(" Testing Testing Testing ")</script>

Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?

Options:

A.

Buffer overflow


B.

Cross-site request forgery


C.

Distributed denial of service


D.

Cross-site scripting


Expert Solution
Questions # 26:

Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

Options:

A.

Key registry


B.

Recovery agent


C.

Directory


D.

Key escrow


Expert Solution
Questions # 27:

Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?

Options:

A.

Poly key exchange


B.

Cross certification


C.

Poly key reference


D.

Cross-site exchange


Expert Solution
Questions # 28:

Which statement best describes a server type under an N-tier architecture?

Options:

A.

A group of servers at a specific layer


B.

A single server with a specific role


C.

A group of servers with a unique role


D.

A single server at a specific layer


Expert Solution
Questions # 29:

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?

Options:

A.

Hping


B.

Traceroute


C.

TCP ping


D.

Broadcast ping


Expert Solution
Questions # 30:

Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?

Options:

A.

CSIRT provides an incident response service to enable a reliable and trusted single point of contact for reporting computer security incidents worldwide.


B.

CSIRT provides a computer security surveillance service to supply a government with important intelligence information on individuals travelling abroad.


C.

CSIRT provides a penetration testing service to support exception reporting on incidents worldwide by individuals and multi-national corporations.


D.

CSIRT provides a vulnerability assessment service to assist law enforcement agencies with profiling an individual's property or company's asset.


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions