Pass the ECCouncil CEH v12 312-50v12 Questions and answers with CertsForce

Viewing page 10 out of 12 pages
Viewing questions 136-150 out of questions
Questions # 136:

An ethical hacker has been tasked with assessing the security of a major corporation's network. She suspects the network uses default SNMP community strings. To exploit this, she plans to extract valuable network information using SNMP enumeration. Which tool could best help her to get the information without directly modifying any parameters within the SNMP agent’s management information base (MIB)?

Options:

A.

snmp-check (snmp_enum Module) to gather a wide array of information about the target


B.

Nmap, with a script to retrieve all running SNMP processes and associated ports


C.

Oputits, are mainly designed for device management and not SNMP enumeration


D.

SnmpWalk, with a command to change an OID to a different value


Expert Solution
Questions # 137:

A network security analyst, while conducting penetration testing, is aiming to identify a service account password using the Kerberos authentication protocol. They have a valid user authentication ticket (TGT) and decided to carry out a Kerberoasting attack. In the scenario described, which of the following steps should the analyst take next?

Options:

A.

Carry out a passive wire sniffing operation using Internet packet sniffers


B.

Extract plaintext passwords, hashes, PIN codes, and Kerberos tickets using a tool like Mimikatz


C.

Perform a PRobability INfinite Chained Elements (PRINCE) attack


D.

Request a service ticket for the service principal name of the target service account


Expert Solution
Questions # 138:

A "Server-Side Includes" attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely.

Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?

Options:

A.

.stm


B.

.html


C.

.rss


D.

.cms


Expert Solution
Questions # 139:

Your organization has signed an agreement with a web hosting provider that requires you to take full responsibility of the maintenance of the cloud-based resources. Which of the following models covers this?

Options:

A.

Platform as a service


B.

Software as a service


C.

Functions as a


D.

service Infrastructure as a service


Expert Solution
Questions # 140:

What type of a vulnerability/attack is it when the malicious person forces the user’s browser to send an authenticated request to a server?

Options:

A.

Session hijacking


B.

Server side request forgery


C.

Cross-site request forgery


D.

Cross-site scripting


Expert Solution
Questions # 141:

An ethical hacker is scanning a target network. They initiate a TCP connection by sending an SYN packet to a target machine and receiving a SYN/ACK packet in response. But instead of completing the three-way handshake with an ACK packet, they send an RST packet. What kind of scan is the ethical hacker likely performing and what is their goal?

Options:

A.

They are performing an SYN scan to stealthily identify open ports without fully establishing a connection


B.

They are performing a TCP connect scan to identify open ports on the target machine


C.

They are performing a vulnerability scan to identify any weaknesses in the target system


D.

They are performing a network scan to identify live hosts and their IP addresses


Expert Solution
Questions # 142:

In both pharming and phishing attacks, an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims.

What is the difference between pharming and phishing attacks?

Options:

A.

In a pharming attack, a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishing attack, an attacker provides the victim with a URL that is either misspelled or looks similar to the actual websites domain name


B.

In a phishing attack, a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a pharming attack, an attacker provides the victim with a URL that is either misspelled or looks very similar to the actual websites domain name


C.

Both pharming and phishing attacks are purely technical and are not considered forms of social engineering


D.

Both pharming and phishing attacks are identical


Expert Solution
Questions # 143:

You are a cybersecurity consultant for a global organization. The organization has adopted a Bring Your Own Device (BYOD)policy, but they have recently experienced a phishing incident where an employee's device was compromised. In the investigation, you discovered that the phishing attack occurred through a third-party email app that the employee had installed. Given the need to balance security and user autonomy under the BYOD policy, how should the organization mitigate the risk of such incidents? Moreover, consider a measure that would prevent similar attacks without overly restricting the use of personal devices.

Options:

A.

Provide employees with corporate-owned devices for work-related tasks.


B.

Implement a mobile device management solution that restricts the installation of non-approved applications.


C.

Require all employee devices to use a company-provided VPN for internet access.


D.

Conduct regular cybersecurity awareness training, focusing on phishing attacks.


Expert Solution
Questions # 144:

Leverox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks. What is the type of threat intelligence collected by Arnold in the above scenario?

Options:

A.

Strategic threat intelligence


B.

Tactical threat intelligence


C.

Operational threat intelligence


D.

Technical threat intelligence


Expert Solution
Questions # 145:

Which among the following is the best example of the third step (delivery) in the cyber kill chain?

Options:

A.

An intruder sends a malicious attachment via email to a target.


B.

An intruder creates malware to be used as a malicious attachment to an email.


C.

An intruder's malware is triggered when a target opens a malicious email attachment.


D.

An intruder's malware is installed on a target's machine.


Expert Solution
Questions # 146:

Jake, a professional hacker, installed spyware on a target iPhone to spy on the target user's activities. He can take complete control of the target mobile device by jailbreaking the device remotely and record audio, capture screenshots, and monitor all phone calls and SMS messages. What is the type of spyware that Jake used to infect the target device?

Options:

A.

DroidSheep


B.

Androrat


C.

Zscaler


D.

Trident


Expert Solution
Questions # 147:

You want to analyze packets on your wireless network. Which program would you use?

Options:

A.

Wireshark with Airpcap


B.

Airsnort with Airpcap


C.

Wireshark with Winpcap


D.

Ethereal with Winpcap


Expert Solution
Questions # 148:

John, a professional hacker, targeted CyberSol Inc., an MNC. He decided to discover the loT devices connected in the target network that are using default credentials and are vulnerable to various hijacking attacks. For this purpose, he used an automated tool to scan the target network for specific types of loT devices and detect whether they are using the default, factory-set credentials. What is the tool employed by John in the above scenario?

Options:

A.

loTSeeker


B.

loT Inspector


C.

AT&T loT Platform


D.

Azure loT Central


Expert Solution
Questions # 149:

An attacker utilizes a Wi-Fi Pineapple to run an access point with a legitimate-looking SSID for a nearby business in order to capture the wireless password. What kind of attack is this?

Options:

A.

MAC spoofing attack


B.

Evil-twin attack


C.

War driving attack


D.

Phishing attack


Expert Solution
Questions # 150:

During a recent vulnerability assessment of a major corporation's IT systems, the security team identified several potential risks. They want to use a vulnerability scoring system to quantify and prioritize these vulnerabilities. They decide to use the Common Vulnerability Scoring System (CVSS). Given the characteristics of the identified vulnerabilities, which of the following statements is the most accurate regarding the metric

types used by CVSS to measure these vulnerabilities?

Options:

A.

Temporal metric represents the inherent qualities of a vulnerability


B.

Base metric represents the inherent qualities of a vulnerability


C.

Environmental metric involves the features that change during the lifetime of the vulnerability


D.

Temporal metric involves measuring vulnerabilities based on a_ specific environment or implementation


Expert Solution
Viewing page 10 out of 12 pages
Viewing questions 136-150 out of questions