Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 11 out of 12 pages
Viewing questions 151-165 out of questions
Questions # 151:

The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. Which of the following options can be useful to ensure the integrity of the data?

Options:

A.

The CFO can use a hash algorithm in the document once he approved the financial statements


B.

The CFO can use an excel file with a password


C.

The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document


D.

The document can be sent to the accountant using an exclusive USB for that document


Expert Solution
Questions # 152:

Let's imagine three companies (A, B, and C), all competing in a challenging global environment.

Company A and B are working together in developing a product that will generate a major competitive advantage for them.

Company A has a secure DNS server while company B has a DNS server vulnerable to spoofing.

With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B.

How do you prevent DNS spoofing?

Options:

A.

Install DNS logger and track vulnerable packets


B.

Disable DNS timeouts


C.

Install DNS Anti-spoofing


D.

Disable DNS Zone Transfer


Expert Solution
Questions # 153:

Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.

Which of the following master components is explained in the above scenario?

Options:

A.

Kube-controller-manager


B.

Kube-scheduler


C.

Kube-apiserver


D.

Etcd cluster


Expert Solution
Questions # 154:

Bill has been hired as a penetration tester and cybersecurity auditor for a major credit card company. Which information security standard is most applicable to his role?

Options:

A.

FISMA


B.

HITECH


C.

PCI-DSS


D.

Sarbanes-Oxley Act


Expert Solution
Questions # 155:

Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes WI-FI sync on the computer so that the device could continue communication with that computer even after being physically disconnected. Now, Clark gains access to Steven’s iPhone through the infected computer and is able to monitor and read all of Steven’s activity on the iPhone, even after the device is out of the communication zone.

Which of the following attacks is performed by Clark in above scenario?

Options:

A.

IOS trustjacking


B.

lOS Jailbreaking


C.

Exploiting SS7 vulnerability


D.

Man-in-the-disk attack


Expert Solution
Questions # 156:

The configuration allows a wired or wireless network interface controller to pass all traffic it receives to the Central Processing Unit (CPU), rather than passing only the frames that the controller is intended to receive. Which of the following is being described?

Options:

A.

Multi-cast mode


B.

Promiscuous mode


C.

WEM


D.

Port forwarding


Expert Solution
Questions # 157:

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

Options:

A.

ACK


B.

SYN


C.

RST


D.

SYN-ACK


Expert Solution
Questions # 158:

An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

Options:

A.

Product-based solutions


B.

Tree-based assessment


C.

Service-based solutions


D.

inference-based assessment


Expert Solution
Questions # 159:

You start performing a penetration test against a specific website and have decided to start by grabbing all the links from the main page.

What is the best Linux pipe to achieve your milestone?

Options:

A.

dirb https://site.com | grep "site"


B.

curl -s https://site.com | grep '<a href='http' | grep "site.com" | cut -d "v" -f 2


C.

wget https://site.com | grep "<a href=*http" | grep "site.com"


D.

wget https://site.com | cut -d "http"


Expert Solution
Questions # 160:

What is a “Collision attack” in cryptography?

Options:

A.

Collision attacks try to get the public key


B.

Collision attacks try to break the hash into three parts to get the plaintext value


C.

Collision attacks try to break the hash into two parts, with the same bytes in each part to get the private key


D.

Collision attacks try to find two inputs producing the same hash


Expert Solution
Questions # 161:

You are a cybersecurity consultant for a global organization. The organization has adopted a Bring Your Own Device (BYOD)policy, but they have recently experienced a phishing incident where an employee's device was compromised. In the investigation, you discovered that the phishing attack occurred through a third-party email app that the employee had installed. Given the need to balance security and user autonomy under the BYOD policy, how should the organization mitigate the risk of such incidents? Moreover, consider a measure that would prevent similar attacks without overly restricting the use of personal devices.

Options:

A.

Provide employees with corporate-owned devices for work-related tasks.


B.

Implement a mobile device management solution that restricts the installation of non-approved applications.


C.

Require all employee devices to use a company-provided VPN for internet access.


D.

Conduct regular cybersecurity awareness training, focusing on phishing attacks.


Expert Solution
Questions # 162:

Which of the following provides a security professional with most information about the system’s security posture?

Options:

A.

Phishing, spamming, sending trojans


B.

Social engineering, company site browsing, tailgating


C.

Wardriving, warchalking, social engineering


D.

Port scanning, banner grabbing, service identification


Expert Solution
Questions # 163:

Which type of malware spreads from one system to another or from one network to another and causes similar types of damage as viruses do to the infected system?

Options:

A.

Rootkit


B.

Trojan


C.

Worm


D.

Adware


Expert Solution
Questions # 164:

env x='(){ :;};echo exploit' bash –c 'cat /etc/passwd'

What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

Options:

A.

Removes the passwd file


B.

Changes all passwords in passwd


C.

Add new user to the passwd file


D.

Display passwd content to prompt


Expert Solution
Questions # 165:

John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the IDAP service for sensitive information such as usernames. addresses, departmental details, and server names to launch further attacks on the target organization.

What is the tool employed by John to gather information from the IDAP service?

Options:

A.

jxplorer


B.

Zabasearch


C.

EarthExplorer


D.

Ike-scan


Expert Solution
Viewing page 11 out of 12 pages
Viewing questions 151-165 out of questions