Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 11 out of 11 pages
Viewing questions 151-165 out of questions
Questions # 151:

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.

What is the best Nmap command you will use? A. nmap -T4 -q 10.10.0.0/24

B. nmap -T4 -F 10.10.0.0/24 C. nmap -T4 -r 10.10.1.0/24 D. nmap -T4 -O 10.10.0.0/24


Expert Solution
Questions # 152:

Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites.

Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.

In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals? (Choose the test answer.)

Options:

A.

Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.


B.

Hire more computer security monitoring personnel to monitor computer systems and networks.


C.

Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.


D.

Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.


Expert Solution
Questions # 153:

A regional bank hires your company to perform a security assessment on their network after a recent data breach. The attacker was able to steal financial data from the bank by compromising only a single server. Based on this information, what should be one of your key recommendations to the bank?

Options:

A.

Place a front-end web server in a demilitarized zone that only handles external web traffic


B.

Require all employees to change their anti-virus program with a new one


C.

Move the financial data to another server on the same IP subnet


D.

Issue new certificates to the web servers from the root certificate authority


Expert Solution
Questions # 154:

What is the minimum number of network connections in a multi homed firewall?

Options:

A.

3


B.

5


C.

4


D.

2


Expert Solution
Questions # 155:

infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

Options:

A.

Reconnaissance


B.

Maintaining access


C.

Scanning


D.

Gaining access


Expert Solution
Questions # 156:

Which tool can be used to silently copy files from USB devices?

Options:

A.

USB Grabber


B.

USB Snoopy


C.

USB Sniffer


D.

Use Dumper


Expert Solution
Questions # 157:

Which of the following statements is FALSE with respect to Intrusion Detection Systems?

Options:

A.

Intrusion Detection Systems can be configured to distinguish specific content in network packets


B.

Intrusion Detection Systems can easily distinguish a malicious payload in an encrypted traffic


C.

Intrusion Detection Systems require constant update of the signature library


D.

Intrusion Detection Systems can examine the contents of the data n context of the network protocol


Expert Solution
Questions # 158:

A zone file consists of which of the following Resource Records (RRs)?

Options:

A.

DNS, NS, AXFR, and MX records


B.

DNS, NS, PTR, and MX records


C.

SOA, NS, AXFR, and MX records


D.

SOA, NS, A, and MX records


Expert Solution
Viewing page 11 out of 11 pages
Viewing questions 151-165 out of questions