Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 121-140 out of questions
Questions # 121:

During network analysis, clients are receiving incorrect gateway and DNS settings due to a rogue DHCP server. What security feature should the administrator enable to prevent this in the future?

Options:

A.

DHCP snooping on trusted interfaces


B.

ARP inspection across VLANs


C.

Port security on all trunk ports


D.

Static DHCP reservations for clients


Expert Solution
Questions # 122:

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-2S6. MMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?

Options:

A.

WPA2 Personal


B.

WPA3-Personal


C.

WPA2-Enterprise


D.

WPA3-Enterprise


Expert Solution
Questions # 123:

env x='(){ :;};echo exploit' bash –c 'cat /etc/passwd'

What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?

Options:

A.

Removes the passwd file


B.

Changes all passwords in passwd


C.

Add new user to the passwd file


D.

Display passwd content to prompt


Expert Solution
Questions # 124:

Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in Evil Corp’s lobby. He checks his current SID, which is:

S-1-5-21-1223352397-1872883824-861252104-501

What needs to happen before Matthew has full administrator access?

Options:

A.

He must perform privilege escalation.


B.

He needs to disable antivirus protection.


C.

He needs to gain physical access.


D.

He already has admin privileges, as shown by the “501” at the end of the SID.


Expert Solution
Questions # 125:

Bob, your senior colleague, has sent you a mail regarding a deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bob denies that he had ever sent a mail. What do you want to "know" to prove yourself that it was Bob who had sent the mail?

Options:

A.

Authentication


B.

Confidentiality


C.

Integrity


D.

Non-Repudiation


Expert Solution
Questions # 126:

Which of the following Bluetooth hacking techniques does an attacker use to send messages to users without the recipient’s consent, similar to email spamming?

Options:

A.

Bluesmacking


B.

BlueSniffing


C.

Bluejacking


D.

Bluesnarfing


Expert Solution
Questions # 127:

The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. Which of the following options can be useful to ensure the integrity of the data?

Options:

A.

The CFO can use a hash algorithm in the document once he approved the financial statements


B.

The CFO can use an excel file with a password


C.

The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document


D.

The document can be sent to the accountant using an exclusive USB for that document


Expert Solution
Questions # 128:

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.

Identify the behavior of the adversary In the above scenario.

Options:

A.

use of command-line interface


B.

Data staging


C.

Unspecified proxy activities


D.

Use of DNS tunneling


Expert Solution
Questions # 129:

Which utility will tell you in real time which ports are listening or in another state?

Options:

A.

Netstat


B.

TCPView


C.

Nmap


D.

Loki


Expert Solution
Questions # 130:

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from command line.

Which command would you use?

Options:

A.

c:\compmgmt.msc


B.

c:\services.msc


C.

c:\ncpa.cp


D.

c:\gpedit


Expert Solution
Questions # 131:

An attacker scans a host with the below command. Which three flags are set?

# nmap -sX host.domain.com

Options:

A.

This is SYN scan. SYN flag is set.


B.

This is Xmas scan. URG, PUSH and FIN are set.


C.

This is ACK scan. ACK flag is set.


D.

This is Xmas scan. SYN and ACK flags are set.


Expert Solution
Questions # 132:

During testing against a network protected by a signature-based IDS, the tester notices that standard scans are blocked. To evade detection, the tester sends TCP headers split into multiple small IP fragments so the IDS cannot reassemble or interpret them, but the destination host can. What technique is being used?

Options:

A.

IP decoying with randomized address positions


B.

SYN scan with spoofed MAC address


C.

Packet crafting with randomized window size


D.

Packet fragmentation to bypass filtering logic


Expert Solution
Questions # 133:

Harris is attempting to identify the OS running on his target machine. He inspected the initial TTL in the IP header and the related TCP window size and obtained the following results:

TTL: 64

Window Size: 5840

What is the OS running on the target machine?

Options:

A.

Solaris OS


B.

Windows OS


C.

Mac OS


D.

Linux OS


Expert Solution
Questions # 134:

A penetration tester has gained access to a target system using default credentials. What is the most effective next step to escalate privileges on the system?

Options:

A.

Perform a denial-of-service (DoS) attack to crash the system


B.

Use a known local privilege escalation vulnerability to gain admin access


C.

Execute a Cross-Site Scripting (XSS) attack on the system's login page


D.

Use a dictionary attack to brute-force the root password


Expert Solution
Questions # 135:

A penetration tester is tasked with uncovering historical content from a company’s website, including previously exposed login portals or sensitive internal pages. Direct interaction with the live site is prohibited due to strict monitoring policies. To stay undetected, the tester decides to explore previously indexed snapshots of the organization’s web content saved by external sources. Which approach would most effectively support this passive information-gathering objective?

Options:

A.

Search with intext:"login" site:target.com to retrieve login data


B.

Use the link: operator to find backlinks to login portals


C.

Apply the cache: operator to view Google's stored versions of target pages


D.

Use the intitle:login operator to list current login pages


Expert Solution
Questions # 136:

You're the security manager for a tech company that uses a database to store sensitive customer data. You have implemented countermeasures against SQL injection attacks. Recently, you noticed some suspicious

activities and suspect an attacker is using SQL injection techniques. The attacker is believed to use different forms of payloads in his SQL queries. In the case of a successful SQL injection attack, which of the following

payloads would have the most significant impact?

Options:

A.

‘OR 'T="1: This payload manipulates the WHERE clause of an SQL statement, allowing the attacker to view unauthorized data


B.

‘OR username LIKE '%: This payload uses the LIKE operator to search for a specific pattern in a column


C.

OR ‘a’='a; DROP TABLE members; --: This payload combines the manipulation of the WHERE clausewith a destructive action, causing data loss


D.

UNION SELECT NULL, NULL, NULL -- : This payload manipulates the UNION SQL operator, enabling the attacker to retrieve data from different database tables


Expert Solution
Questions # 137:

In the context of password security, a simple dictionary attack involves loading a dictionary file into a cracking application such as L0phtCrack or John the Ripper. The brute force method is slow but exhaustive. If you use both brute force and dictionary methods combined to vary words, what would you call such an attack?

Options:

A.

Full Blown


B.

Thorough


C.

Hybrid


D.

BruteDics


Expert Solution
Questions # 138:

You have been hired as an intern at a start-up company. Your first task is to help set up a basic web server for the company’s new website. The team leader has asked you to make sure the server is secure from common - threats. Based on your knowledge from studying for the CEH exam, which of the following actions should be

your priority to secure the web server?

Options:

A.

Installing a web application firewall


B.

limiting the number of concurrent connections to the server


C.

Encrypting the company’s website with SSL/TLS


D.

Regularly updating and patching the server software


Expert Solution
Questions # 139:

You have successfully logged on to a Linux system. You want to now cover your tracks. Your login attempt may be logged in several files located in /var/log. Which file does NOT belong to this list?

Options:

A.

user.log


B.

auth.fesg


C.

wtmp


D.

btmp


Expert Solution
Questions # 140:

Attacker Steve targeted an organization's network with the aim of redirecting the company's web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities In the DNS server software and modified the original IP address of the target website to that of a fake website. What is the technique employed by Steve to gather information for identity theft?

Options:

A.

Pretexting


B.

Pharming


C.

Wardriving


D.

Skimming


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 121-140 out of questions