Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions
Questions # 46:

These hackers have limited or no training and know how to use only basic techniques or tools. What kind of hackers are we talking about?

Options:

A.

Black-Hat Hackers


B.

Script Kiddies


C.

White-Hat Hackers


D.

Gray-Hat Hackers


Expert Solution
Questions # 47:

During an Xmas scan, what indicates a port is closed?

Options:

A.

No return response


B.

RST


C.

ACK


D.

SYN


Expert Solution
Questions # 48:

which of the following protocols can be used to secure an LDAP service against anonymous queries?

Options:

A.

SSO


B.

RADIUS


C.

WPA


D.

NTLM


Expert Solution
Questions # 49:

This type of injection attack does not show any error message. It is difficult to exploit as it returns information when the application is given SQL payloads that elicit a true or false response from the server. By observing the response, an attacker can extract sensitive information. What type of attack is this?

Options:

A.

Time-based SQL injection


B.

Union SQL injection


C.

Error-based SQL injection


D.

Blind SQL injection


Expert Solution
Questions # 50:

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

Options:

A.

Mypervisor rootkit


B.

Kernel toolkit


C.

Hardware rootkit


D.

Firmware rootkit


Expert Solution
Questions # 51:

Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

Options:

A.

BA810DBA98995F1817306D272A9441BB


B.

44EFCE164AB921CQAAD3B435B51404EE


C.

0182BD0BD4444BF836077A718CCDF409


D.

CEC52EB9C8E3455DC2265B23734E0DAC


E.

B757BF5C0D87772FAAD3B435B51404EE


F.

E52CAC67419A9A224A3B108F3FA6CB6D


Expert Solution
Questions # 52:

A large enterprise has been experiencing sporadic system crashes and instability, resulting in limited access to its web services. The security team suspects it could be a result of a Denial of Service (DoS) attack. A significant increase in traffic was noticed in the network logs, with patterns suggesting packet sizes exceeding the prescribed size limit. Which among the following DoS attack techniques best describes this scenario?

Options:

A.

UDP flood attack


B.

Smurf attack


C.

Pulse wave attack


D.

Ping of Death attack


Expert Solution
Questions # 53:

in an attempt to increase the security of your network, you Implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know It. How do you accomplish this?

Options:

A.

Delete the wireless network


B.

Remove all passwords


C.

Lock all users


D.

Disable SSID broadcasting


Expert Solution
Questions # 54:

An attacker scans a host with the below command. Which three flags are set?

# nmap -sX host.domain.com

Options:

A.

This is SYN scan. SYN flag is set.


B.

This is Xmas scan. URG, PUSH and FIN are set.


C.

This is ACK scan. ACK flag is set.


D.

This is Xmas scan. SYN and ACK flags are set.


Expert Solution
Questions # 55:

Which of the following is considered an exploit framework and has the ability to perform automated attacks on services, ports, applications and unpatched security flaws in a computer system?

Options:

A.

Wireshark


B.

Maltego


C.

Metasploit


D.

Nessus


Expert Solution
Questions # 56:

ViruXine.W32 virus hides its presence by changing the underlying executable code. This virus code mutates while keeping the original algorithm intact — the code changes itself each time it runs, but the function of the code (its semantics) does not change at all.

Question # 56

Here is a section of the virus code (refer to image), where the loop performs XOR encryption and changes the way the code looks every time it is executed.

Question # 56

What is this technique called?

Options:

A.

Polymorphic Virus


B.

Metamorphic Virus


C.

Dravidic Virus


D.

Stealth Virus


Expert Solution
Questions # 57:

PGP, SSL, and IKE are all examples of which type of cryptography?

Options:

A.

Digest


B.

Secret Key


C.

Public Key


D.

Hash Algorithm


Expert Solution
Questions # 58:

You are attempting to crack LM Manager hashes from a Windows 2000 SAM file. You will be using an LM brute-force hacking tool for decryption.

What encryption algorithm will you be decrypting?

Options:

A.

MD4


B.

DES


C.

SHA


D.

SSL


Expert Solution
Questions # 59:

What is the purpose of a demilitarized zone on a network?

Options:

A.

To scan all traffic coming through the DMZ to the internal network


B.

To only provide direct access to the nodes within the DMZ and protect the network behind it


C.

To provide a place to put the honeypot


D.

To contain the network devices you wish to protect


Expert Solution
Questions # 60:

A Certified Ethical Hacker (CEH) is given the task to perform an LDAP enumeration on a target system. The system is secured and accepts connections only on secure LDAP. The CEH uses Python for the enumeration process. After successfully installing LDAP and establishing a connection with the target, he attempts to fetch details like the domain name and naming context but is unable to receive the expected response. Considering the circumstances, which of the following is the most plausible reason for this situation?

Options:

A.

The Python version installed on the CEH's machine is incompatible with the Idap3 library


B.

The secure LDAP connection was not properly initialized due to a lack of 'use_ssl = True' in the server object creation


C.

The enumeration process was blocked by the target system's intrusion detection system


D.

The system failed to establish a connection due to an incorrect port number


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 46-60 out of questions