Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which of the following ensures that updates to policies, procedures, and configurations are made in a controlled and documented fashion?

Options:

A.

Regulatory compliance


B.

Peer review


C.

Change management


D.

Penetration testing


Expert Solution
Questions # 62:

Which of the following guidelines or standards is associated with the credit card industry?

Options:

A.

Control Objectives for Information and Related Technology (COBIT)


B.

Sarbanes-Oxley Act (SOX)


C.

Health Insurance Portability and Accountability Act (HIPAA)


D.

Payment Card Industry Data Security Standards (PCI DSS)


Expert Solution
Questions # 63:

Which set of access control solutions implements two-factor authentication?

Options:

A.

USB token and PIN


B.

Fingerprint scanner and retina scanner


C.

Password and PIN


D.

Account and password


Expert Solution
Questions # 64:

Which of the following problems can be solved by using Wireshark?

Options:

A.

Tracking version changes of source code


B.

Checking creation dates on all webpages on a server


C.

Resetting the administrator password on multiple systems


D.

Troubleshooting communication resets between two systems


Expert Solution
Questions # 65:

How is sniffing broadly categorized?

Options:

A.

Active and passive


B.

Broadcast and unicast


C.

Unmanaged and managed


D.

Filtered and unfiltered


Expert Solution
Questions # 66:

What is the main disadvantage of the scripting languages as opposed to compiled programming languages?

Options:

A.

Scripting languages are hard to learn.


B.

Scripting languages are not object-oriented.


C.

Scripting languages cannot be used to create graphical user interfaces.


D.

Scripting languages are slower because they require an interpreter to run the code.


Expert Solution
Questions # 67:

ICMP ping and ping sweeps are used to check for active systems and to check

Options:

A.

if ICMP ping traverses a firewall.


B.

the route that the ICMP ping took.


C.

the location of the switchport in relation to the ICMP ping.


D.

the number of hops an ICMP ping takes to reach a destination.


Expert Solution
Questions # 68:

A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for unauthorized devices every morning at 5:00 am.

Which of the following programming languages would most likely be used?

Options:

A.

PHP


B.

C#


C.

Python


D.

ASP.NET


Expert Solution
Questions # 69:

What results will the following command yield: 'NMAP -sS -O -p 123-153 192.168.100.3'?

Options:

A.

A stealth scan, opening port 123 and 153


B.

A stealth scan, checking open ports 123 to 153


C.

A stealth scan, checking all open ports excluding ports 123 to 153


D.

A stealth scan, determine operating system, and scanning ports 123 to 153


Expert Solution
Questions # 70:

Which statement is TRUE regarding network firewalls preventing Web Application attacks?

Options:

A.

Network firewalls can prevent attacks because they can detect malicious HTTP traffic.


B.

Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.


C.

Network firewalls can prevent attacks if they are properly configured.


D.

Network firewalls cannot prevent attacks because they are too complex to configure.


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions