Pass the ECCouncil CEH v12 312-50v12 Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions
Questions # 76:

If a token and 4-digit personal identification number (PIN) are used to access a computer system and the token performs off-line checking for the correct PIN, what type of attack is possible?

Options:

A.

Birthday


B.

Brute force


C.

Man-in-the-middle


D.

Smurf


Expert Solution
Questions # 77:

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

Options:

A.

A biometric system that bases authentication decisions on behavioral attributes.


B.

A biometric system that bases authentication decisions on physical attributes.


C.

An authentication system that creates one-time passwords that are encrypted with secret keys.


D.

An authentication system that uses passphrases that are converted into virtual passwords.


Expert Solution
Questions # 78:

Study the following log extract and identify the attack.

Question # 78

Options:

A.

Hexcode Attack


B.

Cross Site Scripting


C.

Multiple Domain Traversal Attack


D.

Unicode Directory Traversal Attack


Expert Solution
Questions # 79:

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

Options:

A.

ACK


B.

SYN


C.

RST


D.

SYN-ACK


Expert Solution
Questions # 80:

Which of the following tools can be used to perform a zone transfer?

Options:

A.

NSLookup


B.

Finger


C.

Dig


D.

Sam Spade


E.

Host


F.

Netcat


G.

Neotrace


Expert Solution
Questions # 81:

Under what conditions does a secondary name server request a zone transfer from a primary name server?

Options:

A.

When a primary SOA is higher that a secondary SOA


B.

When a secondary SOA is higher that a primary SOA


C.

When a primary name server has had its service restarted


D.

When a secondary name server has had its service restarted


E.

When the TTL falls to zero


Expert Solution
Questions # 82:

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?

Options:

A.

Application


B.

Transport


C.

Session


D.

Presentation


Expert Solution
Questions # 83:

What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall if your network is comprised of Windows NT, 2000, and XP?

Options:

A.

110


B.

135


C.

139


D.

161


E.

445


F.

1024


Expert Solution
Questions # 84:

What is not a PCI compliance recommendation?

Options:

A.

Use a firewall between the public network and the payment card data.


B.

Use encryption to protect all transmission of card holder data over any public network.


C.

Rotate employees handling credit card transactions on a yearly basis to different departments.


D.

Limit access to card holder data to as few individuals as possible.


Expert Solution
Questions # 85:

Which of the following tools can be used for passive OS fingerprinting?

Options:

A.

nmap


B.

tcpdump


C.

tracert


D.

ping


Expert Solution
Questions # 86:

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

Options:

A.

Social engineering


B.

Piggybacking


C.

Tailgating


D.

Eavesdropping


Expert Solution
Questions # 87:

An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com ", the user is directed to a phishing site.

Which file does the attacker need to modify?

Options:

A.

Boot.ini


B.

Sudoers


C.

Networks


D.

Hosts


Expert Solution
Questions # 88:

What is a “Collision attack” in cryptography?

Options:

A.

Collision attacks try to get the public key


B.

Collision attacks try to break the hash into three parts to get the plaintext value


C.

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key


D.

Collision attacks try to find two inputs producing the same hash


Expert Solution
Questions # 89:

A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the Prometric Online Testing – Reports https://ibt1.prometric.com/users/custom/report_queue/rq_str... corporate network. What tool should the analyst use to perform a Blackjacking attack?

Options:

A.

Paros Proxy


B.

BBProxy


C.

Blooover


D.

BBCrack


Expert Solution
Questions # 90:

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.

What is the best security policy concerning this setup?

Options:

A.

Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.


B.

As long as the physical access to the network elements is restricted, there is no need for additional measures.


C.

There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.


D.

The operator knows that attacks and down time are inevitable and should have a backup site.


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 76-90 out of questions