Pass the ECCouncil Certified Ethical Hacker 312-50 Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following is assured by the use of a hash?

Options:

A.

Integrity


B.

Confidentiality


C.

Authentication


D.

Availability


Expert Solution
Questions # 82:

A company recently hired your team of Ethical Hackers to test the security of their network systems. The company wants to have the attack be as realistic as possible. They did not provide any information besides the name of their company. What phase of security testing would your team jump in right away?

Options:

A.

Scanning


B.

Reconnaissance


C.

Escalation


D.

Enumeration


Expert Solution
Questions # 83:

Which of the following is a low-tech way of gaining unauthorized access to systems?

Options:

A.

Social Engineering


B.

Sniffing


C.

Eavesdropping


D.

Scanning


Expert Solution
Questions # 84:

Which regulation defines security and privacy controls for Federal information systems and organizations?

Options:

A.

NIST-800-53


B.

PCI-DSS


C.

EU Safe Harbor


D.

HIPAA


Expert Solution
Questions # 85:

In Risk Management, how is the term "likelihood" related to the concept of "threat?"

Options:

A.

Likelihood is the probability that a threat-source will exploit a vulnerability.


B.

Likelihood is a possible threat-source that may exploit a vulnerability.


C.

Likelihood is the likely source of a threat that could exploit a vulnerability.


D.

Likelihood is the probability that a vulnerability is a threat-source.


Expert Solution
Questions # 86:

While performing online banking using a Web browser, Kyle receives an email that contains an image of a well-crafted art. Upon clicking the image, a new tab on the web browser opens and shows an animated GIF of bills and coins being swallowed by a crocodile. After several days, Kyle noticed that all his funds on the bank was gone. What Web browser-based security vulnerability got exploited by the hacker?

Options:

A.

Clickjacking


B.

Web Form Input Validation


C.

Cross-Site Request Forgery


D.

Cross-Site Scripting


Expert Solution
Questions # 87:

As a securing consultant, what are some of the things you would recommend to a company to ensure DNS security?

Options:

A.

Use the same machines for DNS and other applications


B.

Harden DNS servers


C.

Use split-horizon operation for DNS servers


D.

Restrict Zone transfers


E.

Have subnet diversity between DNS servers


Expert Solution
Questions # 88:

Look at the following output. What did the hacker accomplish?

Question # 88

Options:

A.

The hacker used whois to gather publicly available records for the domain.


B.

The hacker used the "fierce" tool to brute force the list of available domains.


C.

The hacker listed DNS records on his own domain.


D.

The hacker successfully transferred the zone and enumerated the hosts.


Expert Solution
Questions # 89:

This configuration allows NIC to pass all traffic it receives to the Central Processing Unit (CPU), instead of passing only the frames that the controller is intended to receive. Select the option that BEST describes the above statement.

Options:

A.

Multi-cast mode


B.

WEM


C.

Promiscuous mode


D.

Port forwarding


Expert Solution
Questions # 90:

Which of the following is a component of a risk assessment?

Options:

A.

Administrative safeguards


B.

Physical security


C.

DMZ


D.

Logical interface


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 81-90 out of questions