Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions
Questions # 91:

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

Options:

A.

To determine who is the holder of the root account


B.

To perform a DoS


C.

To create needless SPAM


D.

To illicit a response back that will reveal information about email servers and how they treat undeliverable mail


E.

To test for virus protection


Expert Solution
Questions # 92:

During the process of encryption and decryption, what keys are shared?

Options:

A.

Private keys


B.

User passwords


C.

Public keys


D.

Public and private keys


Expert Solution
Questions # 93:

Identify the web application attack where the attackers exploit vulnerabilities in dynamically generated web pages to inject client-side script into web pages viewed by other users.

Options:

A.

LDAP Injection attack


B.

Cross-Site Scripting (XSS)


C.

SQL injection attack


D.

Cross-Site Request Forgery (CSRF)


Expert Solution
Questions # 94:

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?

Options:

A.

110


B.

135


C.

139


D.

161


E.

445


F.

1024


Expert Solution
Questions # 95:

what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

Options:

A.

Decoy scanning


B.

Packet fragmentation scanning


C.

Spoof source address scanning


D.

Idle scanning


Expert Solution
Questions # 96:

env x=’(){ :;};echo exploit’ bash –c ‘cat/etc/passwd’

What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

Options:

A.

Removes the passwd file


B.

Changes all passwords in passwd


C.

Add new user to the passwd file


D.

Display passwd content to prompt


Expert Solution
Questions # 97:

Attacker Lauren has gained the credentials of an organization's internal server system, and she was often logging in during irregular times to monitor the network activities. The organization was skeptical about the login times and appointed security professional Robert to determine the issue. Robert analyzed the compromised device to find incident details such as the type of attack, its severity, target, impact, method of propagation, and vulnerabilities exploited. What is the incident handling and response (IH&R) phase, in which Robert has determined these issues?

Options:

A.

Preparation


B.

Eradication


C.

Incident recording and assignment


D.

Incident triage


Expert Solution
Questions # 98:

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com ", the user is directed to a phishing site.

Which file does the attacker need to modify?

Options:

A.

Boot.ini


B.

Sudoers


C.

Networks


D.

Hosts


Expert Solution
Questions # 99:

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

Options:

A.

Timing-based attack


B.

Side-channel attack


C.

Downgrade security attack


D.

Cache-based attack


Expert Solution
Questions # 100:

Yancey is a network security administrator for a large electric company. This company provides power for over 100, 000 people in Las Vegas. Yancey has worked for his company for over 15 years and has become very successful. One day, Yancey comes in to work and finds out that the company will be downsizing and he will be out of a job in two weeks. Yancey is very angry and decides to place logic bombs, viruses, Trojans, and backdoors all over the network to take down the company once he has left. Yancey does not care if his actions land him in jail for 30 or more years, he just wants the company to pay for what they are doing to him.

What would Yancey be considered?

Options:

A.

Yancey would be considered a Suicide Hacker


B.

Since he does not care about going to jail, he would be considered a Black Hat


C.

Because Yancey works for the company currently; he would be a White Hat


D.

Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing


Expert Solution
Questions # 101:

What does the following command in netcat do?

nc -l -u -p55555 < /etc/passwd

Options:

A.

logs the incoming connections to /etc/passwd file


B.

loads the /etc/passwd file to the UDP port 55555


C.

grabs the /etc/passwd file when connected to UDP port 55555


D.

deletes the /etc/passwd file when connected to the UDP port 55555


Expert Solution
Questions # 102:

A company’s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application.

What kind of Web application vulnerability likely exists in their software?

Options:

A.

Cross-site scripting vulnerability


B.

SQL injection vulnerability


C.

Web site defacement vulnerability


D.

Gross-site Request Forgery vulnerability


Expert Solution
Questions # 103:

Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.

Question # 103

What is Eve trying to do?

Options:

A.

Eve is trying to connect as a user with Administrator privileges


B.

Eve is trying to enumerate all users with Administrative privileges


C.

Eve is trying to carry out a password crack for user Administrator


D.

Eve is trying to escalate privilege of the null user to that of Administrator


Expert Solution
Questions # 104:

Which method of password cracking takes the most time and effort?

Options:

A.

Dictionary attack


B.

Shoulder surfing


C.

Rainbow tables


D.

Brute force


Expert Solution
Questions # 105:

Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He is looking for an IDS with the following characteristics: - Verifies success or failure of an attack - Monitors system activities Detects attacks that a network-based IDS fails to detect - Near real-time detection and response - Does not require additional hardware - Lower entry cost Which type of IDS is best suited for Tremp's requirements?

Options:

A.

Gateway-based IDS


B.

Network-based IDS


C.

Host-based IDS


D.

Open source-based


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 91-105 out of questions