Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which iOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?

Options:

A.

Tethered jailbreaking


B.

Semi-tethered jailbreaking


C.

Untethered jailbreaking


D.

Semi-Untethered jailbreaking


Expert Solution
Questions # 62:

Attacker Rony Installed a rogue access point within an organization's perimeter and attempted to Intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the above scenario?

Options:

A.

Distributed assessment


B.

Wireless network assessment


C.

Most-based assessment


D.

Application assessment


Expert Solution
Questions # 63:

in the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?

Options:

A.

3.0-6.9


B.

40-6.0


C.

4.0-6.9


D.

3.9-6.9


Expert Solution
Questions # 64:

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: “The attacker must scan every port on the server several times using a set of spoofed sources IP addresses. ” Suppose that you are using Nmap to perform this scan. What flag will you use to satisfy this requirement?

Options:

A.

The -A flag


B.

The -g flag


C.

The -f flag


D.

The -D flag


Expert Solution
Questions # 65:

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.

Which AAA protocol is the most likely able to handle this requirement?

Options:

A.

TACACS+


B.

DIAMETER


C.

Kerberos


D.

RADIUS


Expert Solution
Questions # 66:

Fred is the network administrator for his company. Fred is testing an internal switch.

From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?

Options:

A.

Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.


B.

He can send an IP packet with the SYN bit and the source address of his computer.


C.

Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.


D.

Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.


Expert Solution
Questions # 67:

As a Certified Ethical Hacker, you were contracted by a private firm to conduct an external security assessment through penetration testing.

What document describes the specifics of the testing, the associated violations, and essentially protects both the organization’s interest and your liabilities as a tester?

Options:

A.

Service Level Agreement


B.

Project Scope


C.

Rules of Engagement


D.

Non-Disclosure Agreement


Expert Solution
Questions # 68:

Susan, a software developer, wants her web API to update other applications with the latest information. For this purpose, she uses a user-defined HTTP tailback or push APIs that are raised based on trigger events: when invoked, this feature supplies data to other applications so that users can instantly receive real-time Information.

Which of the following techniques is employed by Susan?

Options:

A.

web shells


B.

Webhooks


C.

REST API


D.

SOAP API


Expert Solution
Questions # 69:

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

Options:

A.

Mypervisor rootkit


B.

Kernel toolkit


C.

Hardware rootkit


D.

Firmware rootkit


Expert Solution
Questions # 70:

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

Options:

A.

AndroidManifest.xml


B.

APK.info


C.

resources.asrc


D.

classes.dex


Expert Solution
Questions # 71:

Gregory, a professional penetration tester working at Sys Security Ltd., is tasked with performing a security test of web applications used in the company. For this purpose, Gregory uses a tool to test for any security loopholes by hijacking a session between a client and server. This tool has a feature of intercepting proxy that can be used to inspect and modify the traffic between the browser and target application. This tool can also perform customized attacks and can be used to test the randomness of session tokens. Which of the following tools is used by Gregory in the above scenario?

Options:

A.

Nmap


B.

Burp Suite


C.

CxSAST


D.

Wireshark


Expert Solution
Questions # 72:

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

How would an attacker exploit this design by launching TCP SYN attack?

Options:

A.

Attacker generates TCP SYN packets with random destination addresses towards a victim host


B.

Attacker floods TCP SYN packets with random source addresses towards a victim host


C.

Attacker generates TCP ACK packets with random source addresses towards a victim host


D.

Attacker generates TCP RST packets with random source addresses towards a victim host


Expert Solution
Questions # 73:

Which Nmap switch helps evade IDS or firewalls?

Options:

A.

-n/-R


B.

-0N/-0X/-0G


C.

-T


D.

-D


Expert Solution
Questions # 74:

Juliet, a security researcher in an organization, was tasked with checking for the authenticity of images to be used in the organization's magazines. She used these images as a search query and tracked the original source and details of the images, which included photographs, profile pictures, and memes. Which of the following footprinting techniques did Rachel use to finish her task?

Options:

A.

Reverse image search


B.

Meta search engines


C.

Advanced image search


D.

Google advanced search


Expert Solution
Questions # 75:

In an attempt to damage the reputation of a competitor organization, Hailey, a professional hacker, gathers a list of employee and client email addresses and other related information by using various search engines, social networking sites, and web spidering tools. In this process, she also uses an automated tool to gather a list of words from the target website to further perform a brute-force attack on the previously gathered email addresses.

What is the tool used by Hailey for gathering a list of words from the target website?

Options:

A.

Shadowsocks


B.

CeWL


C.

Psiphon


D.

Orbot


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions