Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions
Questions # 61:

Password cracking programs reverse the hashing process to recover passwords. (True/False.)

Options:

A.

True


B.

False


Expert Solution
Questions # 62:

During a black-box pen test you attempt to pass IRC traffic over port 80/TCP from a compromised web enabled host. The traffic gets blocked; however, outbound HTTP traffic is unimpeded. What type of firewall is inspecting outbound traffic?

Options:

A.

Circuit


B.

Stateful


C.

Application


D.

Packet Filtering


Expert Solution
Questions # 63:

Which definition among those given below best describes a covert channel?

Options:

A.

A server program using a port that is not well known.


B.

Making use of a protocol in a way it is not intended to be used.


C.

It is the multiplexing taking place on a communication link.


D.

It is one of the weak channels used by WEP which makes it insecure


Expert Solution
Questions # 64:

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

Options:

A.

Yagi antenna


B.

Dipole antenna


C.

Parabolic grid antenna


D.

Omnidirectional antenna


Expert Solution
Questions # 65:

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

Options:

A.

SFTP


B.

Ipsec


C.

SSL


D.

FTPS


Expert Solution
Questions # 66:

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

Options:

A.

Residual risk


B.

Impact risk


C.

Deferred risk


D.

Inherent risk


Expert Solution
Questions # 67:

BitLocker encryption has been implemented for all the Windows-based computers in an organization. You are concerned that someone might lose their cryptographic key. Therefore, a mechanism was implemented to recover the keys from Active Directory.

What is this mechanism called in cryptography?

Options:

A.

Key archival


B.

Key escrow


C.

Certificate rollover


D.

Key renewal


Expert Solution
Questions # 68:

Under what conditions does a secondary name server request a zone transfer from a primary name server?

Options:

A.

When a primary SOA is higher than a secondary SOA


B.

When a secondary SOA is higher than a primary SOA


C.

When a primary name server has had its service restarted


D.

When a secondary name server has had its service restarted


E.

When the TTL falls to zero


Expert Solution
Questions # 69:

Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations.

Bob also concluded that DMZ makes sense just when a stateful firewall is available, which is not the case of TPNQM SA.

In this context, what can you say?

Options:

A.

Bob can be right since DMZ does not make sense when combined with stateless firewalls


B.

Bob is partially right. He does not need to separate networks if he can create rules by destination IPs, one by one


C.

Bob is totally wrong. DMZ is always relevant when the company has internet servers and workstations


D.

Bob is partially right. DMZ does not make sense when a stateless firewall is available


Expert Solution
Questions # 70:

You have the SOA presented below in your Zone.

Your secondary servers have not been able to contact your primary server to synchronize information.

How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries?

collegae.edu. SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)

Options:

A.

One day


B.

One hour


C.

One week


D.

One month


Expert Solution
Questions # 71:

Within the context of Computer Security, which of the following statements describes Social Engineering best?

Options:

A.

Social Engineering is the act of publicly disclosing information


B.

Social Engineering is the means put in place by human resource to perform time accounting


C.

Social Engineering is the act of getting needed information from a person rather than breaking into a system


D.

Social Engineering is a training program within sociology studies


Expert Solution
Questions # 72:

Which of the following statements about a zone transfer is correct? (Choose three.)

Options:

A.

A zone transfer is accomplished with the DNS


B.

A zone transfer is accomplished with the nslookup service


C.

A zone transfer passes all zone information that a DNS server maintains


D.

A zone transfer passes all zone information that a nslookup server maintains


E.

A zone transfer can be prevented by blocking all inbound TCP port 53 connections


F.

Zone transfers cannot occur on the Internet


Expert Solution
Questions # 73:

Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?

Options:

A.

Linux


B.

Unix


C.

OS X


D.

Windows


Expert Solution
Questions # 74:

Which method of password cracking takes the most time and effort?

Options:

A.

Dictionary attack


B.

Shoulder surfing


C.

Rainbow tables


D.

Brute force


Expert Solution
Questions # 75:

James is working as an ethical hacker at Technix Solutions. The management ordered James to discover how vulnerable its network is towards footprinting attacks. James took the help of an open-source framework for performing automated reconnaissance activities. This framework helped James in gathering information using free tools and resources.

What is the framework used by James to conduct footprinting and reconnaissance activities?

Options:

A.

WebSploit Framework


B.

Browser Exploitation Framework


C.

OSINT framework


D.

SpeedPhish Framework


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 61-75 out of questions