Pass the ECCouncil CEH v12 312-50v12 Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
Questions # 16:

Attacker Steve targeted an organization's network with the aim of redirecting the company's web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities In the DNS server software and modified the original IP address of the target website to that of a fake website. What is the technique employed by Steve to gather information for identity theft?

Options:

A.

Pretexting


B.

Pharming


C.

Wardriving


D.

Skimming


Expert Solution
Questions # 17:

What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht have in common?

Options:

A.

All are hacking tools developed by the legion of doom


B.

All are tools that can be used not only by hackers, but also security personnel


C.

All are DDOS tools


D.

All are tools that are only effective against Windows


E.

All are tools that are only effective against Linux


Expert Solution
Questions # 18:

In the context of Windows Security, what is a 'null' user?

Options:

A.

A user that has no skills


B.

An account that has been suspended by the admin


C.

A pseudo account that has no username and password


D.

A pseudo account that was created for security administration purpose


Expert Solution
Questions # 19:

Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a security breach to his company's email server based on analysis of a suspicious connection from the email server to an unknown IP Address.

What is the first thing that Nedved needs to do before contacting the incident response team?

Options:

A.

Leave it as it Is and contact the incident response te3m right away


B.

Block the connection to the suspicious IP Address from the firewall


C.

Disconnect the email server from the network


D.

Migrate the connection to the backup email server


Expert Solution
Questions # 20:

Why containers are less secure that virtual machines?

Options:

A.

Host OS on containers has a larger surface attack.


B.

Containers may full fill disk space of the host.


C.

A compromise container may cause a CPU starvation of the host.


D.

Containers are attached to the same virtual network.


Expert Solution
Questions # 21:

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

Options:

A.

Mypervisor rootkit


B.

Kernel toolkit


C.

Hardware rootkit


D.

Firmware rootkit


Expert Solution
Questions # 22:

There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution Is for a customer to Join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?

Options:

A.

Hybrid


B.

Community


C.

Public


D.

Private


Expert Solution
Questions # 23:

Bob was recently hired by a medical company after it experienced a major cyber security breach. Many patients are complaining that their personal medical records are fully exposed on the Internet and someone can find them with a simple Google search. Bob's boss is very worried because of regulations that protect those data. Which of the following regulations is mostly violated?

Options:

A.

HIPPA/PHl


B.

Pll


C.

PCIDSS


D.

ISO 2002


Expert Solution
Questions # 24:

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

Options:

A.

True


B.

False


Expert Solution
Questions # 25:

When discussing passwords, what is considered a brute force attack?

Options:

A.

You attempt every single possibility until you exhaust all possible combinations or discover the password


B.

You threaten to use the rubber hose on someone unless they reveal their password


C.

You load a dictionary of words into your cracking program


D.

You create hashes of a large number of words and compare it with the encrypted passwords


E.

You wait until the password expires


Expert Solution
Questions # 26:

In the field of cryptanalysis, what is meant by a “rubber-hose" attack?

Options:

A.

Attempting to decrypt cipher text by making logical assumptions about the contents of the original plain text.


B.

Extraction of cryptographic secrets through coercion or torture.


C.

Forcing the targeted key stream through a hardware-accelerated device such as an ASIC.


D.

A backdoor placed into a cryptographic algorithm by its creator.


Expert Solution
Questions # 27:

An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim's data. What type of attack is this?

Options:

A.

Phishing


B.

Vlishing


C.

Spoofing


D.

DDoS


Expert Solution
Questions # 28:

In Trojan terminology, what is a covert channel?

Question # 28

Options:

A.

A channel that transfers information within a computer system or network in a way that violates the security policy


B.

A legitimate communication path within a computer system or network for transfer of data


C.

It is a kernel operation that hides boot processes and services to mask detection


D.

It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections


Expert Solution
Questions # 29:

Which command can be used to show the current TCP/IP connections?

Options:

A.

Netsh


B.

Netstat


C.

Net use connection


D.

Net use


Expert Solution
Questions # 30:

_________ is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

Options:

A.

Trojan


B.

RootKit


C.

DoS tool


D.

Scanner


E.

Backdoor


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions