Pass the ECCouncil CEH v12 312-50v12 Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

Which of the following is a command line packet analyzer similar to GUI-based Wireshark?

Options:

A.

nessus


B.

tcpdump


C.

ethereal


D.

jack the ripper


Expert Solution
Questions # 107:

Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites.

Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.

In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals? (Choose the test answer.)

Options:

A.

Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.


B.

Hire more computer security monitoring personnel to monitor computer systems and networks.


C.

Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.


D.

Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.


Expert Solution
Questions # 108:

Which of the following Linux commands will resolve a domain name into IP address?

Options:

A.

>host-t a hackeddomain.com


B.

>host-t ns hackeddomain.com


C.

>host -t soa hackeddomain.com


D.

>host -t AXFR hackeddomain.com


Expert Solution
Questions # 109:

Which of the following program infects the system boot sector and the executable files at the same time?

Options:

A.

Polymorphic virus


B.

Stealth virus


C.

Multipartite Virus


D.

Macro virus


Expert Solution
Questions # 110:

is a set of extensions to DNS that provide the origin authentication of DNS data to DNS clients (resolvers) so as to reduce the threat of DNS poisoning, spoofing, and similar types of attacks.

Options:

A.

DNSSEC


B.

Resource records


C.

Resource transfer


D.

Zone transfer


Expert Solution
Questions # 111:

Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.

Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.

In this context, what can you say?

Options:

A.

Bob can be right since DMZ does not make sense when combined with stateless firewalls


B.

Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one


C.

Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations


D.

Bob is partially right. DMZ does not make sense when a stateless firewall is available


Expert Solution
Questions # 112:

A company’s policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department. Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?

Options:

A.

tcp.port = = 21


B.

tcp.port = 23


C.

tcp.port = = 21 | | tcp.port = =22


D.

tcp.port ! = 21


Expert Solution
Questions # 113:

Which of the following is the BEST way to defend against network sniffing?

Options:

A.

Using encryption protocols to secure network communications


B.

Register all machines MAC Address in a Centralized Database


C.

Use Static IP Address


D.

Restrict Physical Access to Server Rooms hosting Critical Servers


Expert Solution
Questions # 114:

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.

What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

Options:

A.

Public


B.

Private


C.

Shared


D.

Root


Expert Solution
Questions # 115:

What is the most common method to exploit the “Bash Bug” or “Shellshock” vulnerability?

Options:

A.

SYN Flood


B.

SSH


C.

Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server


D.

Manipulate format strings in text fields


Expert Solution
Questions # 116:

Jack, a disgruntled ex-employee of Incalsol Ltd., decided to inject fileless malware into Incalsol's systems. To deliver the malware, he used the current employees' email IDs to send fraudulent emails embedded with malicious links that seem to be legitimate. When a victim employee clicks on the link, they are directed to a fraudulent website that automatically loads Flash and triggers the exploit. What is the technique used byjack to launch the fileless malware on the target systems?

Options:

A.

In-memory exploits


B.

Phishing


C.

Legitimate applications


D.

Script-based injection


Expert Solution
Questions # 117:

Which of the following statements is TRUE?

Options:

A.

Packet Sniffers operate on the Layer 1 of the OSI model.


B.

Packet Sniffers operate on Layer 2 of the OSI model.


C.

Packet Sniffers operate on both Layer 2 & Layer 3 of the OSI model.


D.

Packet Sniffers operate on Layer 3 of the OSI model.


Expert Solution
Questions # 118:

What is the following command used for?

sqlmap.py-u ,,http://10.10.1.20/?p=1 &forumaction=search" -dbs

Options:

A.

Creating backdoors using SQL injection


B.

A Enumerating the databases in the DBMS for the URL


C.

Retrieving SQL statements being executed on the database


D.

Searching database statements at the IP address given


Expert Solution
Questions # 119:

During a reconnaissance mission, an ethical hacker uses Maltego, a popular footprinting tool, to collect information about a target organization. The information includes the target's Internet infrastructure details (domains, DNS names, Netblocks, IP address information). The hacker decides to use social engineering

techniques to gain further information. Which of the following would be the least likely method of social engineering to yield beneficial information based on the data collected?

Options:

A.

Shoulder surfing to observe sensitive credentials input on the target's computers


B.

Impersonating an ISP technical support agent to trick the target into providing further network details


C.

Dumpster diving in the target company’s trash bins for valuable printouts


D.

Eavesdropping on internal corporate conversations to understand key topics


Expert Solution
Questions # 120:

if you send a TCP ACK segment to a known closed port on a firewall but it does not respond with an RST. what do you know about the firewall you are scanning?

Options:

A.

There is no firewall in place.


B.

This event does not tell you encrypting about the firewall.


C.

It is a stateful firewall


D.

It Is a non-stateful firewall.


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions