Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions
Questions # 31:

In the process of footprinting a target website, an ethical hacker utilized various tools to gather critical information. The hacker encountered a target site where standard web spiders were ineffective due to a specific file in its root directory. However, they managed to uncover all the files and web pages on the target site, monitoring the resulting incoming and outgoing traffic while browsing the website manually. What technique did the hacker likely employ to achieve this?

Options:

A.

Using Photon to retrieve archived URLs of the target website from archive.org


B.

Using the Netcraft tool to gather website information


C.

Examining HTML source code and cookies


D.

User-directed spidering with tools like Burp Suite and WebScarab


Expert Solution
Questions # 32:

John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker Installed a scanner on a machine belonging to one of the vktims and scanned several machines on the same network to Identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?

Options:

A.

Proxy scanner


B.

Agent-based scanner


C.

Network-based scanner


D.

Cluster scanner


Expert Solution
Questions # 33:

One of your team members has asked you to analyze the following SOA record.

What is the TTL?

Rutgers.edu. SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.)

Options:

A.

200303028


B.

3600


C.

604800


D.

2400


E.

60


F.

4800


Expert Solution
Questions # 34:

Kevin, a professional hacker, wants to penetrate CyberTech Inc.’s network. He employed a technique, using which he encoded packets with Unicode characters. The company’s IDS cannot recognize the packet, but the target web server can decode them.

What is the technique used by Kevin to evade the IDS system?

Options:

A.

Desynchronization


B.

Obfuscating


C.

Session splicing


D.

Urgency flag


Expert Solution
Questions # 35:

Which of the following statements is FALSE with respect to Intrusion Detection Systems?

Options:

A.

Intrusion Detection Systems can be configured to distinguish specific content in network packets


B.

Intrusion Detection Systems can easily distinguish a malicious payload in encrypted traffic


C.

Intrusion Detection Systems require constant update of the signature library


D.

Intrusion Detection Systems can examine the contents of the data in context of the network protocol


Expert Solution
Questions # 36:

Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins. What is the type of attack technique Ralph used on jane?

Options:

A.

Dumpster diving


B.

Eavesdropping


C.

Shoulder surfing


D.

impersonation


Expert Solution
Questions # 37:

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch. In a MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports.

What happens when the CAM table becomes full?

Question # 37

Options:

A.

Switch then acts as hub by broadcasting packets to all machines on the network


B.

The CAM overflow table will cause the switch to crash causing Denial of Service


C.

The switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF


D.

Every packet is dropped and the switch sends out SNMP alerts to the IDS port


Expert Solution
Questions # 38:

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

Options:

A.

The computer is not using a private IP address.


B.

The gateway is not routing to a public IP address.


C.

The gateway and the computer are not on the same network.


D.

The computer is using an invalid IP address.


Expert Solution
Questions # 39:

Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

What is the port scanning technique used by Sam to discover open ports?

Options:

A.

Xmas scan


B.

IDLE/IPID header scan


C.

TCP Maimon scan


D.

ACK flag probe scan


Expert Solution
Questions # 40:

Fred is the network administrator for his company. Fred is testing an internal switch. From an external IP address, Fred wants to try and trick this switch into thinking it already has established a session with his computer. How can Fred accomplish this?

Options:

A.

Fred can accomplish this by sending an IP packet with the RST/SIN bit and the source address of his computer.


B.

He can send an IP packet with the SYN bit and the source address of his computer.


C.

Fred can send an IP packet with the ACK bit set to zero and the source address of the switch.


D.

Fred can send an IP packet to the switch with the ACK bit and the source address of his machine.


Expert Solution
Questions # 41:

As an IT Security Analyst, you’ve been asked to review the security measures of an e-commerce website that relies on a SQL database for storing sensitive customer data. Recently, an anonymous tip has alerted you to a possible threat: a seasoned hacker who specializes in SQL Injection attacks may be targeting your system. The site already employs input validation measures to prevent basic injection attacks, and it blocks any user inputs containing suspicious patterns. However, this hacker is known to use advanced SQL Injection techniques. Given this situation, which of the following strategies would the hacker most likely adopt to bypass your security measures?

Options:

A.

The hacker could deploy an 'out-of-band' SQL Injection attack, extracting data via a different communication channel, such as DNS or HTTP requests


B.

The hacker may resort to a DDoS attack instead, attempting to crash the server and thus render the e commerce site unavailable


C.

The hacker may try to use SQL commands which are less known and less likely to be blocked by your system's security


D.

The hacker might employ a blind' SQL Injection attack, taking advantage of the application's true or false responses to extract data bit by bit


Expert Solution
Questions # 42:

In the process of implementing a network vulnerability assessment strategy for a tech company, the security

analyst is confronted with the following scenarios:

1) A legacy application is discovered on the network, which no longer receives updates from the vendor.

2) Several systems in the network are found running outdated versions of web browsers prone to distributed

attacks.

3) The network firewall has been configured using default settings and passwords.

4) Certain TCP/IP protocols used in the organization are inherently insecure.

The security analyst decides to use vulnerability scanning software. Which of the following limitations of vulnerability assessment should the analyst be most cautious about in this context?

Options:

A.

Vulnerability scanning software is limited in its ability to perform live tests on web applications to detect errors or unexpected behavior


B.

Vulnerability scanning software cannot define the impact of an identified vulnerability on different business operations


C.

Vulnerability scanning software is limited in its ability to detect vulnerabilities at a given point in time


D.

Vulnerability scanning software is not immune to software engineering flaws that might lead to serious vulnerabilities being missed


Expert Solution
Questions # 43:

Firewalls are the software or hardware systems that are able to control and monitor the traffic coming in and out the target network based on pre-defined set of rules. Which of the following types of firewalls can protect against SQL injection attacks?

Options:

A.

Data-driven firewall


B.

Packet firewall


C.

Web application firewall


D.

Stateful firewall


Expert Solution
Questions # 44:

Alice needs to send a confidential document to her coworker. Bryan. Their company has public key infrastructure set up. Therefore. Alice both encrypts the message and digitally signs it. Alice uses_______to encrypt the message, and Bryan uses__________to confirm the digital signature.

Options:

A.

Bryan’s public key; Bryan’s public key


B.

Alice’s public key; Alice’s public key


C.

Bryan’s private key; Alice’s public key


D.

Bryan’s public key; Alice’s public key


Expert Solution
Questions # 45:

When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

How would an attacker exploit this design by launching TCP SYN attack?

Options:

A.

Attacker generates TCP SYN packets with random destination addresses towards a victim host


B.

Attacker floods TCP SYN packets with random source addresses towards a victim host


C.

Attacker generates TCP ACK packets with random source addresses towards a victim host


D.

Attacker generates TCP RST packets with random source addresses towards a victim host


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 31-45 out of questions