Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions
Questions # 31:

What is the main security service a cryptographic hash provides?

Options:

A.

Integrity and ease of computation


B.

Message authentication and collision resistance


C.

Integrity and collision resistance


D.

Integrity and computational in-feasibility


Expert Solution
Questions # 32:

Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections. Which of the following attack techniques is used by Stella to compromise the web services?

Options:

A.

XML injection


B.

WS-Address spoofing


C.

SOAPAction spoofing


D.

Web services parsing attacks


Expert Solution
Questions # 33:

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

Options:

A.

Copy the system files from a known good system


B.

Perform a trap and trace


C.

Delete the files and try to determine the source


D.

Reload from a previous backup


E.

Reload from known good media


Expert Solution
Questions # 34:

Which utility will tell you in real time which ports are listening or in another state?

Options:

A.

Netstat


B.

TCPView


C.

Nmap


D.

Loki


Expert Solution
Questions # 35:

What would be the purpose of running "wget 192.168.0.15 -q -S" against a web server?

Options:

A.

Performing content enumeration on the web server to discover hidden folders


B.

Using wget to perform banner grabbing on the webserver


C.

Flooding the web server with requests to perform a DoS attack


D.

Downloading all the contents of the web page locally for further examination


Expert Solution
Questions # 36:

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

Options:

A.

Output encoding


B.

Enforce least privileges


C.

Whitelist validation


D.

Blacklist validation


Expert Solution
Questions # 37:

A hacker has successfully infected an internet-facing server which he will then use to send junk mail, take part in coordinated attacks, or host junk email content. Which sort of trojan infects this server?

Options:

A.

Botnet Trojan


B.

Banking Trojans


C.

Turtle Trojans


D.

Ransomware Trojans


Expert Solution
Questions # 38:

Upon establishing his new startup, Tom hired a cloud service provider (CSP) but was dissatisfied with their service and wanted to move to another CSP.

What part of the contract might prevent him from doing so?

Options:

A.

Virtualization


B.

Lock-in


C.

Lock-down


D.

Lock-up


Expert Solution
Questions # 39:

An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim's data. What type of attack is this?

Options:

A.

Phishing


B.

Vlishing


C.

Spoofing


D.

DDoS


Expert Solution
Questions # 40:

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

Question # 40

In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

Options:

A.

Switch then acts as hub by broadcasting packets to all machines on the network


B.

The CAM overflow table will cause the switch to crash causing Denial of Service


C.

The switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF


D.

Every packet is dropped and the switch sends out SNMP alerts to the IDS port


Expert Solution
Questions # 41:

Which results will be returned with the following Google search query? site:target.com – site:Marketing.target.com accounting

Options:

A.

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.


B.

Results matching all words in the query.


C.

Results for matches on target.com and Marketing.target.com that include the word “accounting”


D.

Results matching “accounting” in domain target.com but not on the site Marketing.target.com


Expert Solution
Questions # 42:

A "Server-Side Includes" attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely.

Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?

Options:

A.

.stm


B.

.html


C.

.rss


D.

.cms


Expert Solution
Questions # 43:

The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. Which of the following options can be useful to ensure the integrity of the data?

Options:

A.

The CFO can use a hash algorithm in the document once he approved the financial statements


B.

The CFO can use an excel file with a password


C.

The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document


D.

The document can be sent to the accountant using an exclusive USB for that document


Expert Solution
Questions # 44:

Insecure direct object reference is a type of vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key. Suppose a malicious user Rob tries to get access to the account of a benign user Ned.

Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?

Options:

A.

“GET /restricted/goldtransfer?to=Rob&from=1 or 1=1’ HTTP/1.1Host: westbank.com”


B.

“GET /restricted/\r\n\%00account%00Ned%00access HTTP/1.1 Host: westbank.com”


C.

“GET /restricted/accounts/?name=Ned HTTP/1.1 Host westbank.com”


D.

“GET /restricted/ HTTP/1.1 Host: westbank.com


Expert Solution
Questions # 45:

This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By observing the response, an attacker can extract sensitive information. What type of attack is this?

Options:

A.

Time-based SQL injection


B.

Union SQL injection


C.

Error-based SQL injection


D.

Blind SQL injection


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 31-45 out of questions