Pass the ECCouncil CEH v11 312-50v11 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which wireless security protocol replaces the personal pre-shared key (PSK) authentication with Simultaneous Authentication of Equals (SAE) and is therefore resistant to offline dictionary attacks?

Options:

A.

WPA3-Personal


B.

WPA2-Enterprise


C.

Bluetooth


D.

ZigBee


Expert Solution
Questions # 122:

Bob, an attacker, has managed to access a target loT device. He employed an online tool to gather information related to the model of the loT device and the certifications granted to it. Which of the following tools did Bob employ to gather the above Information?

Options:

A.

search.com


B.

EarthExplorer


C.

Google image search


D.

FCC ID search


Expert Solution
Questions # 123:

Dorian Is sending a digitally signed email to Polly, with which key is Dorian signing this message and how is Poly validating It?

Options:

A.

Dorian is signing the message with his public key. and Poly will verify that the message came from Dorian by using Dorian's private key.


B.

Dorian Is signing the message with Polys public key. and Poly will verify that the message came from Dorian by using Dorian's public key.


C.

Dorian is signing the message with his private key. and Poly will verify that the message came from Dorian by using Dorian's public key.


D.

Dorian is signing the message with Polys private key. and Poly will verify mat the message came from Dorian by using Dorian's public key.


Expert Solution
Questions # 124:

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

Options:

A.

Overloading Port Address Translation


B.

Dynamic Port Address Translation


C.

Dynamic Network Address Translation


D.

Static Network Address Translation


Expert Solution
Questions # 125:

Sam, a professional hacker. targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?

Options:

A.

Social engineering


B.

insider threat


C.

Password reuse


D.

Reverse engineering


Expert Solution
Questions # 126:

What piece of hardware on a computer's motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

Options:

A.

CPU


B.

GPU


C.

UEFI


D.

TPM


Expert Solution
Questions # 127:

Which of the following are well known password-cracking programs?

Options:

A.

L0phtcrack


B.

NetCat


C.

Jack the Ripper


D.

Netbus


E.

John the Ripper


Expert Solution
Questions # 128:

Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device. Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives. What is the tool employed by Mason in the above scenario?

Options:

A.

NetPass.exe


B.

Outlook scraper


C.

WebBrowserPassView


D.

Credential enumerator


Expert Solution
Questions # 129:

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session, upon receiving the users request. Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website. What is the attack performed by Bobby in the above scenario?

Options:

A.

Wardriving


B.

KRACK attack


C.

jamming signal attack


D.

aLTEr attack


Expert Solution
Questions # 130:

The change of a hard drive failure is once every three years. The cost to buy a new hard drive is $300. It will require 10 hours to restore the OS and software to the new hard disk. It will require a further 4 hours to restore the database from the last backup to the new hard disk. The recovery person earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1(100%). What is the closest approximate cost of this replacement and recovery operation per year?

Options:

A.

$1320


B.

$440


C.

$100


D.

$146


Expert Solution
Questions # 131:

Which of the following statements is TRUE?

Options:

A.

Packet Sniffers operate on the Layer 1 of the OSI model.


B.

Packet Sniffers operate on Layer 2 of the OSI model.


C.

Packet Sniffers operate on both Layer 2 & Layer 3 of the OSI model.


D.

Packet Sniffers operate on Layer 3 of the OSI model.


Expert Solution
Questions # 132:

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?

Options:

A.

Use his own public key to encrypt the message.


B.

Use Marie's public key to encrypt the message.


C.

Use his own private key to encrypt the message.


D.

Use Marie's private key to encrypt the message.


Expert Solution
Questions # 133:

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bab denies that he had ever sent a mail. What do you want to ““know”” to prove yourself that it was Bob who had send a mail?

Options:

A.

Non-Repudiation


B.

Integrity


C.

Authentication


D.

Confidentiality


Expert Solution
Questions # 134:

George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m. What is the short-range wireless communication technology George employed in the above scenario?

Options:

A.

MQTT


B.

LPWAN


C.

Zigbee


D.

NB-IoT


Expert Solution
Questions # 135:

Consider the following Nmap output:

Question # 135

what command-line parameter could you use to determine the type and version number of the web server?

Options:

A.

-sv


B.

-Pn


C.

-V


D.

-ss


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions