Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions
Questions # 106:

Sam is working as a system administrator In an organization. He captured the principal characteristics of a vulnerability and produced a numerical score to reflect Its severity using CVSS v3.0 to property assess and prioritize the organization's vulnerability management processes. The base score that Sam obtained after performing cvss rating was 4.0. What is the CVSS severity level of the vulnerability discovered by Sam in the above scenario?

Options:

A.

Medium


B.

Low


C.

Critical


D.

High


Expert Solution
Questions # 107:

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve's profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days. Sieve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?

Options:

A.

Diversion theft


B.

Baiting


C.

Honey trap


D.

Piggybacking


Expert Solution
Questions # 108:

The “Gray-box testing” methodology enforces what kind of restriction?

Options:

A.

Only the external operation of a system is accessible to the tester.


B.

The internal operation of a system in only partly accessible to the tester.


C.

Only the internal operation of a system is known to the tester.


D.

The internal operation of a system is completely known to the tester.


Expert Solution
Questions # 109:

Study the snort rule given below and interpret the rule. alert tcp any any --> 192.168.1.0/24 111

(content:"|00 01 86 a5|"; msG. "mountd access";)

Options:

A.

An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111


B.

An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet


C.

An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet


D.

An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111


Expert Solution
Questions # 110:

You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone is performing an ARP spoofing attack on your laptop?

Options:

A.

You should check your ARP table and see if there is one IP address with two different MAC addresses.


B.

You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates.


C.

You should use netstat to check for any suspicious connections with another IP address within the LAN.


D.

You cannot identify such an attack and must use a VPN to protect your traffic, r


Expert Solution
Questions # 111:

What is the purpose of a demilitarized zone on a network?

Options:

A.

To scan all traffic coming through the DMZ to the internal network


B.

To only provide direct access to the nodes within the DMZ and protect the network behind it


C.

To provide a place to put the honeypot


D.

To contain the network devices you wish to protect


Expert Solution
Questions # 112:

Jim, a professional hacker, targeted an organization that is operating critical Industrial Infrastructure. Jim used Nmap to scan open pons and running services on systems connected to the organization's OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered Information such as the vendor name, product code and name, device name, and IP address. Which of the following Nmap commands helped Jim retrieve the required information?

Options:

A.

nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >


B.

nmap -Pn -sU -p 44818 --script enip-info < Target IP >


C.

nmap -Pn -sT -p 46824 < Target IP >


D.

nmap -Pn -sT -p 102 --script s7-info < Target IP >


Expert Solution
Questions # 113:

is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.

Options:

A.

DNSSEC


B.

Resource records


C.

Resource transfer


D.

Zone transfer


Expert Solution
Questions # 114:

Jacob works as a system administrator in an organization. He wants to extract the source code of a mobile application and disassemble the application to analyze its design flaws. Using this technique, he wants to fix any bugs in the application, discover underlying vulnerabilities, and improve defense strategies against attacks.

What is the technique used by Jacob in the above scenario to improve the security of the mobile application?

Options:

A.

Reverse engineering


B.

App sandboxing


C.

Jailbreaking


D.

Social engineering


Expert Solution
Questions # 115:

What does the –oX flag do in an Nmap scan?

Options:

A.

Perform an eXpress scan


B.

Output the results in truncated format to the screen


C.

Output the results in XML format to a file


D.

Perform an Xmas scan


Expert Solution
Questions # 116:

MX record priority increases as the number increases. (True/False.)

Options:

A.

True


B.

False


Expert Solution
Questions # 117:

Which of the following is assured by the use of a hash?

Options:

A.

Authentication


B.

Confidentiality


C.

Availability


D.

Integrity


Expert Solution
Questions # 118:

Under what conditions does a secondary name server request a zone transfer from a primary name server?

Options:

A.

When a primary SOA is higher that a secondary SOA


B.

When a secondary SOA is higher that a primary SOA


C.

When a primary name server has had its service restarted


D.

When a secondary name server has had its service restarted


E.

When the TTL falls to zero


Expert Solution
Questions # 119:

You start performing a penetration test against a specific website and have decided to start from grabbing all the links from the main page.

What Is the best Linux pipe to achieve your milestone?

Options:

A.

dirb https://site.com | grep "site"


B.

curl -s https://sile.com | grep ‘’ < a href-\’http" | grep "Site-com- | cut -d "V" -f 2


C.

wget https://stte.com | grep "< a href=\*http" | grep "site.com"


D.

wgethttps://site.com | cut-d "http-


Expert Solution
Questions # 120:

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

Options:

A.

symmetric algorithms


B.

asymmetric algorithms


C.

hashing algorithms


D.

integrity algorithms


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 106-120 out of questions