Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following network attacks relies on sending an abnormally large packet size that exceeds TCP/IP specifications?

Options:

A.

Ping of death


B.

SYN flooding


C.

TCP hijacking


D.

Smurf attack


Expert Solution
Questions # 32:

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

Options:

A.

The gateway is not routing to a public IP address.


B.

The computer is using an invalid IP address.


C.

The gateway and the computer are not on the same network.


D.

The computer is not using a private IP address.


Expert Solution
Questions # 33:

An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

Options:

A.

Birthday attack


B.

Plaintext attack


C.

Meet in the middle attack


D.

Chosen ciphertext attack


Expert Solution
Questions # 34:

When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?

Options:

A.

The key entered is a symmetric key used to encrypt the wireless data.


B.

The key entered is a hash that is used to prove the integrity of the wireless data.


C.

The key entered is based on the Diffie-Hellman method.


D.

The key is an RSA key used to encrypt the wireless data.


Expert Solution
Questions # 35:

Which of the following defines the role of a root Certificate Authority (CA) in a Public Key Infrastructure (PKI)?

Options:

A.

The root CA is the recovery agent used to encrypt data when a user's certificate is lost.


B.

The root CA stores the user's hash value for safekeeping.


C.

The CA is the trusted root that issues certificates.


D.

The root CA is used to encrypt email messages to prevent unintended disclosure of data.


Expert Solution
Questions # 36:

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?

Options:

A.

An extensible security framework named COBIT


B.

A list of flaws and how to fix them


C.

Web application patches


D.

A security certification for hardened web applications


Expert Solution
Questions # 37:

Which element of Public Key Infrastructure (PKI) verifies the applicant?

Options:

A.

Certificate authority


B.

Validation authority


C.

Registration authority


D.

Verification authority


Expert Solution
Questions # 38:

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?

Options:

A.

Multiple keys for non-repudiation of bulk data


B.

Different keys on both ends of the transport medium


C.

Bulk encryption for data transmission over fiber


D.

The same key on each end of the transmission medium


Expert Solution
Questions # 39:

Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?

Options:

A.

They provide a repeatable framework.


B.

Anyone can run the command line scripts.


C.

They are available at low cost.


D.

They are subject to government regulation.


Expert Solution
Questions # 40:

Advanced encryption standard is an algorithm used for which of the following?

Options:

A.

Data integrity


B.

Key discovery


C.

Bulk data encryption


D.

Key recovery


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 31-40 out of questions