Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions
Questions # 1:

Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then used to launch which types of attack?

Options:

A.

MITM attack


B.

Birthday attack


C.

DDoS attack


D.

Password attack


Expert Solution
Questions # 2:

Morris, an attacker, wanted to check whether the target AP is in a locked state. He attempted using different utilities to identify WPS-enabled APs in the target wireless network. Ultimately, he succeeded with one special command-line utility. Which of the following command-line utilities allowed Morris to discover the WPS-enabled APs?

Options:

A.

wash


B.

ntptrace


C.

macof


D.

net View


Expert Solution
Questions # 3:

Alex, a cloud security engineer working in Eyecloud Inc. is tasked with isolating applications from the underlying infrastructure and stimulating communication via well-defined channels. For this purpose, he used an open-source technology that helped him in developing, packaging, and running applications; further, the technology provides PaaS through OS-level visualization, delivers containerized software packages, and promotes fast software delivery. What is the cloud technology employed by Alex in the above scenario?

Options:

A.

Virtual machine


B.

Serverless computing


C.

Docker


D.

Zero trust network


Expert Solution
Questions # 4:

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.

What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

Options:

A.

Public


B.

Private


C.

Shared


D.

Root


Expert Solution
Questions # 5:

If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?

Options:

A.

–r


B.

–F


C.

–P


D.

–sP


Expert Solution
Questions # 6:

Which DNS resource record can indicate how long any "DNS poisoning" could last?

Options:

A.

MX


B.

SOA


C.

NS


D.

TIMEOUT


Expert Solution
Questions # 7:

Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

Options:

A.

[inurl:]


B.

[related:]


C.

[info:]


D.

[site:]


Expert Solution
Questions # 8:

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment-

Options:

A.

VCloud based


B.

Honypot based


C.

Behaviour based


D.

Heuristics based


Expert Solution
Questions # 9:

Which of the following Linux commands will resolve a domain name into IP address?

Options:

A.

>host-t a hackeddomain.com


B.

>host-t ns hackeddomain.com


C.

>host -t soa hackeddomain.com


D.

>host -t AXFR hackeddomain.com


Expert Solution
Questions # 10:

Kevin, an encryption specialist, implemented a technique that enhances the security of keys used for encryption and authentication. Using this technique, Kevin input an initial key to an algorithm that generated an enhanced key that is resistant to brute-force attacks. What is the technique employed by Kevin to improve the security of encryption keys?

Options:

A.

Key derivation function


B.

Key reinstallation


C.

A Public key infrastructure


D.

Key stretching


Expert Solution
Questions # 11:

What did the following commands determine?

Question # 11

Options:

A.

That the Joe account has a SID of 500


B.

These commands demonstrate that the guest account has NOT been disabled


C.

These commands demonstrate that the guest account has been disabled


D.

That the true administrator is Joe


E.

Issued alone, these commands prove nothing


Expert Solution
Questions # 12:

You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.

Dear valued customers,

We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your antivirus code:

Question # 12

or you may contact us at the following address:

Media Internet Consultants, Edif. Neptuno, Planta

Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama

How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

Options:

A.

Look at the website design, if it looks professional then it is a Real Anti-Virus website


B.

Connect to the site using SSL, if you are successful then the website is genuine


C.

Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site


D.

Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware


E.

Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware


Expert Solution
Questions # 13:

Scenario: Joe turns on his home computer to access personal online banking. When he enters the URL www.bank.com. the website is displayed, but it prompts him to re-enter his credentials as if he has never visited the site before. When he examines the website URL closer, he finds that the site is not secure and the web address appears different. What type of attack he is experiencing?.

Options:

A.

Dos attack


B.

DHCP spoofing


C.

ARP cache poisoning


D.

DNS hijacking


Expert Solution
Questions # 14:

Which of the following web vulnerabilities would an attacker be attempting to exploit if they delivered the following input?

<!DOCTYPE blah [ < IENTITY trustme SYSTEM "file:///etc/passwd" > ] >

Options:

A.

XXE


B.

SQLi


C.

IDOR


D.

XXS


Expert Solution
Questions # 15:

Which system consists of a publicly available set of databases that contain domain name registration contact information?

Options:

A.

WHOIS


B.

CAPTCHA


C.

IANA


D.

IETF


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-15 out of questions