Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which regulation defines security and privacy controls for Federal information systems and organizations?

Options:

A.

HIPAA


B.

EU Safe Harbor


C.

PCI-DSS


D.

NIST-800-53


Expert Solution
Questions # 17:

You have successfully logged on to a Linux system. You want to now cover your tracks. Your login attempt may be logged in several files located in /var/log. Which file does NOT belong to this list?

Options:

A.

user.log


B.

auth.fesg


C.

wtmp


D.

btmp


Expert Solution
Questions # 18:

Which DNS resource record can indicate how long any "DNS poisoning" could last?

Options:

A.

MX


B.

SOA


C.

NS


D.

TIMEOUT


Expert Solution
Questions # 19:

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

Options:

A.

Converts passwords to uppercase.


B.

Hashes are sent in clear text over the network.


C.

Makes use of only 32-bit encryption.


D.

Effective length is 7 characters.


Expert Solution
Questions # 20:

Which of the following is a component of a risk assessment?

Options:

A.

Administrative safeguards


B.

Physical security


C.

DMZ


D.

Logical interface


Expert Solution
Questions # 21:

Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session 10 to the target employee. The session ID links the target employee to Boneys account page without disclosing any information to the victim. When the target employee clicks on the link, all the sensitive payment details entered in a form are linked to Boneys account. What is the attack performed by Boney in the above scenario?

Options:

A.

Session donation attack


B.

Session fixation attack


C.

Forbidden attack


D.

CRIME attack


Expert Solution
Questions # 22:

You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions. What Google dork operator would you use?

Options:

A.

filetype


B.

ext


C.

inurl


D.

site


Expert Solution
Questions # 23:

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using social engineering, you come to know that they are enforcing strong passwords. Passwords must be at least 8 characters and use 3 of the 4 categories (lowercase, uppercase, numbers, special characters). With your knowledge of likely user habits, what would be the fastest type of password cracking attack to run against these hash values?

Options:

A.

Online Attack


B.

Dictionary Attack


C.

Brute Force Attack


D.

Hybrid Attack


Expert Solution
Questions # 24:

During an attempt to perform an SQL injection attack, a certified ethical hacker is focusing on the

identification of database engine type by generating an ODBC error. The ethical hacker, after injecting various payloads, finds that the web application returns a standard, generic error message that does not reveal any detailed database information. Which of the following techniques would the hacker consider next to obtain useful information about the underlying database?

Options:

A.

Use the UNION operator to combine the result sets of two or more SELECT statements


B.

Attempt to compromise the system through OS-level command shell execution


C.

Try to insert a string value where a number is expected in the input field


D.

Utilize a blind injection technique that uses time delays or error signatures to extract information


Expert Solution
Questions # 25:

which of the following Bluetooth hacking techniques refers to the theft of information from a wireless device through Bluetooth?

Options:

A.

Bluesmacking


B.

Bluebugging


C.

Bluejacking


D.

Bluesnarfing


Expert Solution
Questions # 26:

Which of the following DoS tools is used to attack target web applications by starvation of available sessions on the web server? The tool keeps sessions at halt using never-ending POST transmissions and sending an arbitrarily large content-length header value.

Options:

A.

My Doom


B.

Astacheldraht


C.

R-U-Dead-Yet? (RUDY)


D.

LOIC


Expert Solution
Questions # 27:

Which results will be returned with the following Google search query?

site:target.com –site:Marketing.target.com accounting

Options:

A.

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting.


B.

Results matching all words in the query.


C.

Results for matches on target.com and Marketing.target.com that include the word “accounting”


D.

Results matching “accounting” in domain target.com but not on the site Marketing.target.com


Expert Solution
Questions # 28:

What useful information is gathered during a successful Simple Mail Transfer Protocol (SMTP) enumeration?

Options:

A.

The two internal commands VRFY and EXPN provide a confirmation of valid users, email addresses, aliases, and mailing lists.


B.

Reveals the daily outgoing message limits before mailboxes are locked


C.

The internal command RCPT provides a list of ports open to message traffic.


D.

A list of all mail proxy server addresses used by the targeted host


Expert Solution
Questions # 29:

A friend of yours tells you that he downloaded and executed a file that was sent to him by a coworker. Since the file did nothing when executed, he asks you for help because he suspects that he may have installed a Trojan on his computer.

What tests would you perform to determine whether his computer is infected?

Options:

A.

Use ExifTool and check for malicious content.


B.

You do not check; rather, you immediately restore a previous snapshot of the operating system.


C.

Upload the file to VirusTotal.


D.

Use netstat and check for outgoing connections to strange IP addresses or domains.


Expert Solution
Questions # 30:

You are tasked to perform a penetration test. While you are performing information gathering, you find an employee list in Google. You find the receptionist’s email, and you send her an email changing the source email to her boss’s email (boss@company). In this email, you ask for a pdf with information. She reads your email and sends back a pdf with links. You exchange the pdf links with your malicious links (these links contain malware) and send back the modified pdf, saying that the links don’t work. She reads your email, opens the links, and her machine gets infected. You now have access to the company network. What testing method did you use?

Options:

A.

Social engineering


B.

Piggybacking


C.

Tailgating


D.

Eavesdropping


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 16-30 out of questions