Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

At what stage of the cyber kill chain theory model does data exfiltration occur?

Options:

A.

Actions on objectives


B.

Weaponization


C.

installation


D.

Command and control


Expert Solution
Questions # 77:

what is the port to block first in case you are suspicious that an loT device has been compromised?

Options:

A.

22


B.

443


C.

48101


D.

80


Expert Solution
Questions # 78:

ping-* 6 192.168.0.101

Output:

Pinging 192.168.0.101 with 32 bytes of data:

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101:

Ping statistics for 192.168.0101

Packets: Sent = 6, Received = 6, Lost = 0 (0% loss).

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

What does the option * indicate?

Options:

A.

t


B.

s


C.

a


D.

n


Expert Solution
Questions # 79:

Richard, an attacker, targets an MNC. in this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed by Richard?

Options:

A.

VoIP footprinting


B.

VPN footprinting


C.

Whois footprinting


D.

Email footprinting


Expert Solution
Questions # 80:

What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?

Options:

A.

Black-box


B.

Announced


C.

White-box


D.

Grey-box


Expert Solution
Questions # 81:

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

Options:

A.

A biometric system that bases authentication decisions on behavioral attributes.


B.

A biometric system that bases authentication decisions on physical attributes.


C.

An authentication system that creates one-time passwords that are encrypted with secret keys.


D.

An authentication system that uses passphrases that are converted into virtual passwords.


Expert Solution
Questions # 82:

Jason, an attacker, targeted an organization to perform an attack on its Internet-facing web server with the intention of gaining access to backend servers, which are protected by a firewall. In this process, he used a URL https://xyz.com/feed.php?url:externaIsile.com/feed/to to obtain a remote feed and altered the URL input to the local host to view all the local resources on the target server. What is the type of attack Jason performed In the above scenario?

Options:

A.

website defacement


B.

Server-side request forgery (SSRF) attack


C.

Web server misconfiguration


D.

web cache poisoning attack


Expert Solution
Questions # 83:

BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory. What is this mechanism called in cryptography?

Options:

A.

Key archival


B.

Key escrow.


C.

Certificate rollover


D.

Key renewal


Expert Solution
Questions # 84:

To create a botnet. the attacker can use several techniques to scan vulnerable machines. The attacker first collects Information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list Is divided by assigning half of the list to the newly compromised machines. The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.

Which technique is discussed here?

Options:

A.

Hit-list-scanning technique


B.

Topological scanning technique


C.

Subnet scanning technique


D.

Permutation scanning technique


Expert Solution
Questions # 85:

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

What is the port scanning technique used by Sam to discover open ports?

Options:

A.

Xmas scan


B.

IDLE/IPID header scan


C.

TCP Maimon scan


D.

ACK flag probe scan


Expert Solution
Questions # 86:

What is the role of test automation in security testing?

Options:

A.

It is an option but it tends to be very expensive.


B.

It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.


C.

Test automation is not usable in security due to the complexity of the tests.


D.

It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.


Expert Solution
Questions # 87:

Identify the UDP port that Network Time Protocol (NTP) uses as its primary means of communication?

Options:

A.

113


B.

69


C.

123


D.

161


Expert Solution
Questions # 88:

Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the targets MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which of the following cloud attacks did Alice perform in the above scenario?

Options:

A.

Cloud hopper attack


B.

Cloud cryptojacking


C.

Cloudborne attack


D.

Man-in-the-cloud (MITC) attack


Expert Solution
Questions # 89:

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

Options:

A.

openssl s_client -site www.website.com:443


B.

openssl_client -site www.website.com:443


C.

openssl s_client -connect www.website.com:443


D.

openssl_client -connect www.website.com:443


Expert Solution
Questions # 90:

Mike, a security engineer, was recently hired by BigFox Ltd. The company recently experienced disastrous DoS attacks. The management had instructed Mike to build defensive strategies for the company's IT infrastructure to thwart DoS/DDoS attacks. Mike deployed some countermeasures to handle jamming and scrambling attacks. What is the countermeasure Mike applied to defend against jamming and scrambling attacks?

Options:

A.

Allow the usage of functions such as gets and strcpy


B.

Allow the transmission of all types of addressed packets at the ISP level


C.

Implement cognitive radios in the physical layer


D.

A Disable TCP SYN cookie protection


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions