Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions
Questions # 106:

Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice’s machine. From the command prompt, she types the following command:

Question # 106 What is Eve trying to do?

Options:

A.

Eve is trying to connect as a user with Administrator privileges


B.

Eve is trying to enumerate all users with Administrative privileges


C.

Eve is trying to carry out a password crack for user Administrator


D.

Eve is trying to escalate privilege of the null user to that of Administrator


Expert Solution
Questions # 107:

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has Snort installed, and the second machine (192.168.0.150) has Kiwi Syslog installed. You perform a SYN scan in your network, and you notice that Kiwi Syslog is not receiving the alert message from Snort. You decide to run Wireshark on the Snort machine to check if the messages are going to the Kiwi Syslog machine. What Wireshark filter will show the connections from the Snort machine to Kiwi Syslog machine?

Options:

A.

tcp.srcport==514 && ip.src==192.168.0.99


B.

tcp.srcport==514 && ip.src==192.168.150


C.

tcp.dstport==514 && ip.dst==192.168.0.99


D.

tcp.dstport==514 && ip.dst==192.168.0.150


Expert Solution
Questions # 108:

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?

Options:

A.

Alice's private key


B.

Alice's public key


C.

His own private key


D.

His own public key


Expert Solution
Questions # 109:

An attacker runs the netcat tool to transfer a secret file between two hosts.

He is worried about information being sniffed on the network.

How would the attacker use netcat to encrypt the information before transmitting onto the wire?

Question # 109

Options:

A.

Machine A: netcat -l -p -s password 1234 < testfile Machine B: netcat 1234


B.

Machine A: netcat -l -e magickey -p 1234 < testfile Machine B: netcat 1234


C.

Machine A: netcat -l -p 1234 < testfile -pw password Machine B: netcat 1234 -pw password


D.

Use cryptcat instead of netcat


Expert Solution
Questions # 110:

On performing a risk assessment, you need to determine the potential impacts when some of the critical business processes of the company interrupt its service.

What is the name of the process by which you can determine those critical businesses?

Options:

A.

Emergency Plan Response (EPR)


B.

Business Impact Analysis (BIA)


C.

Risk Mitigation


D.

Disaster Recovery Planning (DRP)


Expert Solution
Questions # 111:

You are the lead cybersecurity analyst at a multinational corporation that uses a hybrid encryption system to secure inter-departmental communications. The system uses RSA encryption for key exchange and AES for data encryption, taking advantage of the strengths of both asymmetric and symmetric encryption. Each RSA key pair has a size of 'n' bits, with larger keys providing more security at the cost of slower performance. The

time complexity of generating an RSA key pair is O(n*2), and AES encryption has a time complexity of O(n). An attacker has developed a quantum algorithm with time complexity O((log n)*2) to crack RSA encryption. Given *n=4000' and variable ‘AES key size’, which scenario is likely to provide the best balance of security and

performance? which scenario would provide the best balance of security and performance?

Options:

A.

Data encryption with 3DES using a 168-bit key: Offers high security but slower performance due to 3DES's inherent inefficiencies.


B.

Data encryption with Blowfish using a 448-bit key: Offers high security but potential compatibility issues due to Blowfish's less widespread use.


C.

Data encryption with AES-128: Provides moderate security and fast encryption, offering a balance between the two.


D.

Data encryption with AES-256: Provides high security with better performance than 3DES, but not as fast as other AES key sizes.


Expert Solution
Questions # 112:

Becky has been hired by a client from Dubai to perform a penetration test against one of their remote offices. Working from her location in Columbus, Ohio, Becky runs her usual reconnaissance scans to obtain basic information about their network. When analyzing the results of her Whois search, Becky notices that the IP was allocated to a location in Le Havre, France. Which regional Internet registry should Becky go to for detailed information?

Options:

A.

ARIN


B.

APNIC


C.

RIPE


D.

LACNIC


Expert Solution
Questions # 113:

In Trojan terminology, what is a covert channel?

Question # 113

Options:

A.

A channel that transfers information within a computer system or network in a way that violates the security policy


B.

A legitimate communication path within a computer system or network for transfer of data


C.

It is a kernel operation that hides boot processes and services to mask detection


D.

It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections


Expert Solution
Questions # 114:

Allen, a professional pen tester, was hired by xpertTech solutWns to perform an attack simul-ation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. B/enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration.

identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?

Options:

A.

<1B>


B.

<00>


C.

<03>


D.

<20>


Expert Solution
Questions # 115:

Attacker Rony Installed a rogue access point within an organization's perimeter and attempted to Intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by Johnson in the above scenario?

Options:

A.

Distributed assessment


B.

Wireless network assessment


C.

Host-based assessment


D.

Application assessment


Expert Solution
Questions # 116:

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.

What is the best security policy concerning this setup?

Options:

A.

Network elements must be hardened with user IDs and strong passwords. Regular security tests and audits should be performed.


B.

As long as the physical access to the network elements is restricted, there is no need for additional measures.


C.

There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.


D.

The operator knows that attacks and downtime are inevitable and should have a backup site.


Expert Solution
Questions # 117:

What does the –oX flag do in an Nmap scan?

Options:

A.

Perform an eXpress scan


B.

Output the results in truncated format to the screen


C.

Output the results in XML format to a file


D.

Perform an Xmas scan


Expert Solution
Questions # 118:

An attacker decided to crack the passwords used by industrial control systems. In this process, he employed a loop strategy to recover these passwords. He used one character at a time to check whether the first character entered is correct; if so, he continued the loop for consecutive characters. If not, he terminated the loop. Furthermore, the attacker checked how much time the device took to finish one complete password authentication process, through which he deduced how many characters entered are correct.

What is the attack technique employed by the attacker to crack the passwords of the industrial control systems?

Options:

A.

Side-channel attack


B.

Denial-of-service attack


C.

HMI-based attack


D.

Buffer overflow attack


Expert Solution
Questions # 119:

Attempting an injection attack on a web server based on responses to True/False QUESTION NO:s is called which of the following?

Options:

A.

Compound SQLi


B.

Blind SQLi


C.

Classic SQLi


D.

DMS-specific SQLi


Expert Solution
Questions # 120:

Your company was hired by a small healthcare provider to perform a technical assessment on the network.

What is the best approach for discovering vulnerabilities on a Windows-based computer?

Options:

A.

Use the built-in Windows Update tool


B.

Use a scan tool like Nessus


C.

Check MITRE.org for the latest list of CVE findings


D.

Create a disk image of a clean Windows installation


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 106-120 out of questions