Pass the ECCouncil CEH v12 312-50v12 Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions
Questions # 1:

Fingerprinting an Operating System helps a cracker because:

Options:

A.

It defines exactly what software you have installed


B.

It opens a security-delayed window based on the port being scanned


C.

It doesn't depend on the patches that have been applied to fix existing security holes


D.

It informs the cracker of which vulnerabilities he may be able to exploit on your system


Questions # 2:

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

Options:

A.

Wireless sniffing


B.

Piggybacking


C.

Evil twin


D.

Wardriving


Questions # 3:

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

Options:

A.

AndroidManifest.xml


B.

APK.info


C.

resources.asrc


D.

classes.dex


Questions # 4:

Robin, a professional hacker, targeted an organization's network to sniff all the traffic. During this process.

Robin plugged in a rogue switch to an unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.

What is the attack performed by Robin in the above scenario?

Options:

A.

ARP spoofing attack


B.

VLAN hopping attack


C.

DNS poisoning attack


D.

STP attack


Questions # 5:

Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about ONS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names. IP addresses. DNS records, and network Who is records. He further exploited this information to launch other sophisticated attacks. What is the tool employed by Gerard in the above scenario?

Options:

A.

Knative


B.

zANTI


C.

Towelroot


D.

Bluto


Questions # 6:

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. You understand that all users are required to use passwords that are at least 8 characters in length. All passwords must also use 3 of the 4 following categories: lower case letters, capital letters, numbers and special characters. With your existing knowledge of users, likely user account names and the possibility that they will choose the easiest passwords possible, what would be the fastest type of password cracking attack you can run against these hash values and still get results?

Options:

A.

Online Attack


B.

Dictionary Attack


C.

Brute Force Attack


D.

Hybrid Attack


Questions # 7:

What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment-

Options:

A.

VCloud based


B.

Honypot based


C.

Behaviour based


D.

Heuristics based


Questions # 8:

Samuel a security administrator, is assessing the configuration of a web server. He noticed that the server permits SSlv2 connections, and the same private key certificate is used on a different server that allows SSLv2 connections. This vulnerability makes the web server vulnerable to attacks as the SSLv2 server can leak key information.

Which of the following attacks can be performed by exploiting the above vulnerability?

Options:

A.

DROWN attack


B.

Padding oracle attack


C.

Side-channel attack


D.

DUHK attack


Questions # 9:

The network administrator at Spears Technology, Inc has configured the default gateway Cisco router's access-list as below:

You are hired to conduct security testing on their network.

You successfully brute-force the SNMP community string using a SNMP crack tool.

The access-list configured at the router prevents you from establishing a successful connection.

You want to retrieve the Cisco configuration from the router. How would you proceed?

Options:

A.

Use the Cisco's TFTP default password to connect and download the configuration file


B.

Run a network sniffer and capture the returned traffic with the configuration file from the router


C.

Run Generic Routing Encapsulation (GRE) tunneling protocol from your computer to the router masking your IP address


D.

Send a customized SNMP set request with a spoofed source IP address in the range -192.168.1.0


Questions # 10:

In this attack, a victim receives an e-mail claiming from PayPal stating that their account has been disabled and confirmation is required before activation. The attackers then scam to collect not one but two credit card numbers, ATM PIN number and other personal details. Ignorant users usually fall prey to this scam.

Which of the following statement is incorrect related to this attack?

Options:

A.

Do not reply to email messages or popup ads asking for personal or financial information


B.

Do not trust telephone numbers in e-mails or popup ads


C.

Review credit card and bank account statements regularly


D.

Antivirus, anti-spyware, and firewall software can very easily detect these type of attacks


E.

Do not send credit card numbers, and personal or financial information via e-mail


Questions # 11:

Question # 11

Identify the correct terminology that defines the above statement.

Options:

A.

Vulnerability Scanning


B.

Penetration Testing


C.

Security Policy Implementation


D.

Designing Network Security


Questions # 12:

You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.

Your peer, Peter Smith who works at the same department disagrees with you.

He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.

What is Peter Smith talking about?

Options:

A.

Untrained staff or ignorant computer users who inadvertently become the weakest link in your security chain


B.

"zero-day" exploits are the weakest link in the security chain since the IDS will not be able to detect these attacks


C.

"Polymorphic viruses" are the weakest link in the security chain since the Anti-Virus scanners will not be able to detect these attacks


D.

Continuous Spam e-mails cannot be blocked by your security system since spammers use different techniques to bypass the filters in your gateway


Questions # 13:

Richard, an attacker, aimed to hack loT devices connected to a target network. In this process. Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the loT network, which repeats the captured signals of the devices. What Is the type of attack performed by Richard In the above scenario?

Options:

A.

Side-channel attack


B.

Replay attack


C.

CrypTanalysis attack


D.

Reconnaissance attack


Questions # 14:

A newly joined employee. Janet, has been allocated an existing system used by a previous employee. Before issuing the system to Janet, it was assessed by Martin, the administrator. Martin found that there were possibilities of compromise through user directories, registries, and other system parameters. He also Identified vulnerabilities such as native configuration tables, incorrect registry or file permissions, and software configuration errors. What is the type of vulnerability assessment performed by Martin?

Options:

A.

Credentialed assessment


B.

Database assessment


C.

Host-based assessment


D.

Distributed assessment


Questions # 15:

ViruXine.W32 virus hides their presence by changing the underlying executable code.

This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all.

Question # 15

Here is a section of the Virus code:

Question # 15

What is this technique called?

Options:

A.

Polymorphic Virus


B.

Metamorphic Virus


C.

Dravidic Virus


D.

Stealth Virus


Viewing page 1 out of 12 pages
Viewing questions 1-15 out of questions