Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions
Questions # 46:

A newly joined employee. Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also Identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. What is the type of vulnerability assessment performed by Martin?

Options:

A.

Credentialed assessment


B.

Database assessment


C.

Host-based assessment


D.

Distributed assessment


Expert Solution
Questions # 47:

Emily, an extrovert obsessed with social media, posts a large amount of private information, photographs, and location tags of recently visited places. Realizing this. James, a professional hacker, targets Emily and her acquaintances, conducts a location search to detect their geolocation by using an automated tool, and gathers information to perform other sophisticated attacks. What is the tool employed by James in the above scenario?

Options:

A.

ophcrack


B.

Hootsuite


C.

VisualRoute


D.

HULK


Expert Solution
Questions # 48:

One of your team members has asked you to analyze the following SOA record. What is the version?

Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)

Options:

A.

200303028


B.

3600


C.

604800


D.

2400


E.

60


F.

4800


Expert Solution
Questions # 49:

Peter extracts the SIDs list from Windows 2000 Server machine using the hacking tool "SIDExtractor". Here is the output of the SIDs:

Question # 49

From the above list identify the user account with System Administrator privileges.

Options:

A.

John


B.

Rebecca


C.

Sheela


D.

Shawn


E.

Somia


F.

Chang


G.

Micah


Expert Solution
Questions # 50:

Robin, a professional hacker, targeted an organization's network to sniff all the traffic. During this process.

Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.

What is the attack performed by Robin in the above scenario?

Options:

A.

ARP spoofing attack


B.

VLAN hopping attack


C.

DNS poisoning attack


D.

STP attack


Expert Solution
Questions # 51:

An LDAP directory can be used to store information similar to a SQL database. LDAP uses a _____ database structure instead of SQL’s _____ structure. Because of this, LDAP has difficulty representing many-to-one relationships.

Options:

A.

Relational, Hierarchical


B.

Strict, Abstract


C.

Hierarchical, Relational


D.

Simple, Complex


Expert Solution
Questions # 52:

What is GINA?

Options:

A.

Gateway Interface Network Application


B.

GUI Installed Network Application CLASS


C.

Global Internet National Authority (G-USA)


D.

Graphical Identification and Authentication DLL


Expert Solution
Questions # 53:

which of the following protocols can be used to secure an LDAP service against anonymous queries?

Options:

A.

SSO


B.

RADIUS


C.

WPA


D.

NTLM


Expert Solution
Questions # 54:

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Joel in the above scenario?

Options:

A.

DNS rebinding attack


B.

Clickjacking attack


C.

MarioNet attack


D.

Watering hole attack


Expert Solution
Questions # 55:

Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials. Which of the following tools is employed by Clark to create the spoofed email?

Options:

A.

PyLoris


B.

Slowloris


C.

Evilginx


D.

PLCinject


Expert Solution
Questions # 56:

Log monitoring tools performing behavioral analysis have alerted several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login activities, it is noticed that none of the logins have occurred during typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than twelve hours. What protocol used on Linux servers to synchronize the time has stopped working?

Options:

A.

Time Keeper


B.

NTP


C.

PPP


D.

OSPP


Expert Solution
Questions # 57:

An attacker runs netcat tool to transfer a secret file between two hosts.

Question # 57

He is worried about information being sniffed on the network.

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

Options:

A.

Machine A: netcat -l -p -s password 1234 < testfileMachine B: netcat 1234


B.

Machine A: netcat -l -e magickey -p 1234 < testfileMachine B: netcat 1234


C.

Machine A: netcat -l -p 1234 < testfile -pw passwordMachine B: netcat 1234 -pw password


D.

Use cryptcat instead of netcat


Expert Solution
Questions # 58:

During the enumeration phase. Lawrence performs banner grabbing to obtain information such as OS details and versions of services running. The service that he enumerated runs directly on TCP port 445.

Which of the following services is enumerated by Lawrence in this scenario?

Options:

A.

Server Message Block (SMB)


B.

Network File System (NFS)


C.

Remote procedure call (RPC)


D.

Telnet


Expert Solution
Questions # 59:

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two. What would you call this attack?

Options:

A.

Interceptor


B.

Man-in-the-middle


C.

ARP Proxy


D.

Poisoning Attack


Expert Solution
Questions # 60:

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

Options:

A.

There is no way to tell because a hash cannot be reversed


B.

The right most portion of the hash is always the same


C.

The hash always starts with AB923D


D.

The left most portion of the hash is always the same


E.

A portion of the hash will be all 0's


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 46-60 out of questions