Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions
Questions # 16:

Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to for detailed information?

Options:

A.

ARIN


B.

APNIC


C.

RIPE


D.

LACNIC


Expert Solution
Questions # 17:

Given below are different steps involved in the vulnerability-management life cycle.

1) Remediation

2) Identify assets and create a baseline

3) Verification

4) Monitor

5) Vulnerability scan

6) Risk assessment

Identify the correct sequence of steps involved in vulnerability management.

Options:

A.

2-->5-->6-->1-->3-->4


B.

2-->1-->5-->6-->4-->3


C.

2-->4-->5-->3-->6--> 1


D.

1-->2-->3-->4-->5-->6


Expert Solution
Questions # 18:

What two conditions must a digital signature meet?

Options:

A.

Has to be the same number of characters as a physical signature and must be unique.


B.

Has to be unforgeable, and has to be authentic.


C.

Must be unique and have special characters.


D.

Has to be legible and neat.


Expert Solution
Questions # 19:

An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

Options:

A.

Product-based solutions


B.

Tree-based assessment


C.

Service-based solutions


D.

inference-based assessment


Expert Solution
Questions # 20:

The security team of Debry Inc. decided to upgrade Wi-Fi security to thwart attacks such as dictionary attacks and key recovery attacks. For this purpose, the security team started implementing cutting-edge technology that uses a modern key establishment protocol called the simultaneous authentication of equals (SAE), also known as dragonfly key exchange, which replaces the PSK concept. What is the Wi-Fi encryption technology implemented by Debry Inc.?

Options:

A.

WEP


B.

WPA


C.

WPA2


D.

WPA3


Expert Solution
Questions # 21:

Which rootkit is characterized by its function of adding code and/or replacing some of the operating-system kernel code to obscure a backdoor on a system?

Options:

A.

User-mode rootkit


B.

Library-level rootkit


C.

Kernel-level rootkit


D.

Hypervisor-level rootkit


Expert Solution
Questions # 22:

What would be the fastest way to perform content enumeration on a given web server by using the Gobuster tool?

Options:

A.

Performing content enumeration using the bruteforce mode and 10 threads


B.

Shipping SSL certificate verification


C.

Performing content enumeration using a wordlist


D.

Performing content enumeration using the bruteforce mode and random file extensions


Expert Solution
Questions # 23:

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Options:

A.

har.txt


B.

SAM file


C.

wwwroot


D.

Repair file


Expert Solution
Questions # 24:

Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities. Which type of virus detection method did Chandler use in this context?

Options:

A.

Heuristic Analysis


B.

Code Emulation


C.

Scanning


D.

Integrity checking


Expert Solution
Questions # 25:

Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?

Options:

A.

Tier-1: Developer machines


B.

Tier-4: Orchestrators


C.

Tier-3: Registries


D.

Tier-2: Testing and accreditation systems


Expert Solution
Questions # 26:

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

Options:

A.

hping2 host.domain.com


B.

hping2 --set-ICMP host.domain.com


C.

hping2 -i host.domain.com


D.

hping2 -1 host.domain.com


Expert Solution
Questions # 27:

What tool can crack Windows SMB passwords simply by listening to network traffic?

Options:

A.

This is not possible


B.

Netbus


C.

NTFSDOS


D.

L0phtcrack


Expert Solution
Questions # 28:

Samuel a security administrator, is assessing the configuration of a web server. He noticed that the server permits SSlv2 connections, and the same private key certificate is used on a different server that allows SSLv2 connections. This vulnerability makes the web server vulnerable to attacks as the SSLv2 server can leak key information.

Which of the following attacks can be performed by exploiting the above vulnerability?

Options:

A.

DROWN attack


B.

Padding oracle attack


C.

Side-channel attack


D.

DUHK attack


Expert Solution
Questions # 29:

“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hot-spot by posing as a legitimate provider. This type of attack may be used to steal the passwords of

unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.”

Fill in the blank with appropriate choice.

Options:

A.

Evil Twin Attack


B.

Sinkhole Attack


C.

Collision Attack


D.

Signal Jamming Attack


Expert Solution
Questions # 30:

Why containers are less secure that virtual machines?

Options:

A.

Host OS on containers has a larger surface attack.


B.

Containers may full fill disk space of the host.


C.

A compromise container may cause a CPU starvation of the host.


D.

Containers are attached to the same virtual network.


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 16-30 out of questions