Pass the ECCouncil CEH v12 312-50v12 Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
Questions # 46:

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

Options:

A.

Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.


B.

Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.


C.

Symmetric encryption allows the server to securely transmit the session keys out-of-band.


D.

Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.


Expert Solution
Questions # 47:

You are programming a buffer overflow exploit and you want to create a NOP sled of 200 bytes in the program exploit.c

Question # 47

What is the hexadecimal value of NOP instruction?

Options:

A.

0x60


B.

0x80


C.

0x70


D.

0x90


Expert Solution
Questions # 48:

Sam, a professional hacker. targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS 1AM credentials and further compromise the employee's account. What is the technique used by Sam to compromise the AWS IAM credentials?

Options:

A.

Social engineering


B.

insider threat


C.

Password reuse


D.

Reverse engineering


Expert Solution
Questions # 49:

what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

Options:

A.

Decoy scanning


B.

Packet fragmentation scanning


C.

Spoof source address scanning


D.

Idle scanning


Expert Solution
Questions # 50:

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

Options:

A.

Bryan’s public key; Bryan’s public key


B.

Alice’s public key; Alice’s public key


C.

Bryan’s private key; Alice’s public key


D.

Bryan’s public key; Alice’s public key


Expert Solution
Questions # 51:

In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

Options:

A.

Full Blown


B.

Thorough


C.

Hybrid


D.

BruteDics


Expert Solution
Questions # 52:

You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software.

Dear valued customers,

We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your antivirus code:

Question # 52

or you may contact us at the following address:

Media Internet Consultants, Edif. Neptuno, Planta

Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama

How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?

Options:

A.

Look at the website design, if it looks professional then it is a Real Anti-Virus website


B.

Connect to the site using SSL, if you are successful then the website is genuine


C.

Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site


D.

Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware


E.

Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware


Expert Solution
Questions # 53:

You are performing a penetration test for a client and have gained shell access to a Windows machine on the internal network. You intend to retrieve all DNS records for the internal domain, if the DNS server is at 192.168.10.2 and the domain name is abccorp.local, what command would you type at the nslookup prompt to attempt a zone transfer?

Options:

A.

list server=192.168.10.2 type=all


B.

is-d abccorp.local


C.

Iserver 192.168.10.2-t all


D.

List domain=Abccorp.local type=zone


Expert Solution
Questions # 54:

Suppose that you test an application for the SQL injection vulnerability. You know that the backend database

is based on Microsoft SQL Server. In the login/password form, you enter the following credentials:

Username: attack' or 1=1 -

Password: 123456

Based on the above credentials, which of the following SQL commands are you expecting to be executed by the server, if there is indeed an SQL injection vulnerability?

Options:

A.

select * from Users where UserName = 'attack'' or 1=1 -- and UserPassword = '123456'


B.

select * from Users where UserName = 'attack' or 1=1 -- and UserPassword = '123456'


C.

select * from Users where UserName = 'attack or 1=1 -- and UserPassword = '123456'


D.

select * from Users where UserName = 'attack' or 1=1 --' and UserPassword = '123456'


Expert Solution
Questions # 55:

This TCP flag instructs the sending system to transmit all buffered data immediately.

Options:

A.

SYN


B.

RST


C.

PSH


D.

URG


E.

FIN


Expert Solution
Questions # 56:

Take a look at the following attack on a Web Server using obstructed URL:

Question # 56

How would you protect from these attacks?

Options:

A.

Configure the Web Server to deny requests involving "hex encoded" characters


B.

Create rules in IDS to alert on strange Unicode requests


C.

Use SSL authentication on Web Servers


D.

Enable Active Scripts Detection at the firewall and routers


Expert Solution
Questions # 57:

Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains access to Steven’s iPhone through the infected computer and is able to monitor and read all of Steven’s activity on the iPhone, even after the device is out of the communication zone.

Which of the following attacks is performed by Clark in above scenario?

Options:

A.

IOS trustjacking


B.

lOS Jailbreaking


C.

Exploiting SS7 vulnerability


D.

Man-in-the-disk attack


Expert Solution
Questions # 58:

CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your office in New York, you craft a specially formatted email message and send it across the Internet to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your email message looks like this:

From: jim_miller@companyxyz.com

To: michelle_saunders@companyxyz.com Subject: Test message

Date: 4/3/2017 14:37

The employee of CompanyXYZ receives your email message.

This proves that CompanyXYZ’s email gateway doesn’t prevent what?

Options:

A.

Email Masquerading


B.

Email Harvesting


C.

Email Phishing


D.

Email Spoofing


Expert Solution
Questions # 59:

What is a NULL scan?

Options:

A.

A scan in which all flags are turned off


B.

A scan in which certain flags are off


C.

A scan in which all flags are on


D.

A scan in which the packet size is set to zero


E.

A scan with an illegal packet size


Expert Solution
Questions # 60:

You have the SOA presented below in your Zone.

Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries?

collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)

Options:

A.

One day


B.

One hour


C.

One week


D.

One month


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions