Pass the ECCouncil CEH v13 312-50v13 Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions
Questions # 121:

John, a security analyst working for an organization, found a critical vulnerability on the organization's LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later.

What would John be considered as?

Options:

A.

Cybercriminal


B.

Black hat


C.

White hat


D.

Gray hat


Expert Solution
Questions # 122:

You want to analyze packets on your wireless network. Which program would you use?

Options:

A.

Wireshark with Airpcap


B.

Airsnort with Airpcap


C.

Wireshark with Winpcap


D.

Ethereal with Winpcap


Expert Solution
Questions # 123:

While using your bank’s online servicing you notice the following string in the URL bar:

"http://www.MyPersonalBank.com/account?id=368940911028389 &Damount=10980&Camount=21"

You observe that if you modify the Damount & Camount values and submit the request, that data on the web page reflects the changes.

Which type of vulnerability is present on this site?

Options:

A.

Cookie Tampering


B.

SQL Injection


C.

Web Parameter Tampering


D.

XSS Reflection


Expert Solution
Questions # 124:

An ethical hacker is testing the security of a website's database system against SQL Injection attacks. They discover that the IDS has a strong signature detection mechanism to detect typical SQL injection patterns.

Which evasion technique can be most effectively used to bypass the IDS signature detection while performing a SQL Injection attack?

Options:

A.

Implement case variation by altering the case of SQL statements


B.

Employ IP fragmentation to obscure the attack payload


C.

Use Hex encoding to represent the SQL query string


D.

Leverage string concatenation to break identifiable keywords


Expert Solution
Questions # 125:

Which among the following is the best example of the third step (delivery) in the cyber kill chain?

Options:

A.

An intruder sends a malicious attachment via email to a target.


B.

An intruder creates malware to be used as a malicious attachment to an email.


C.

An intruder's malware is triggered when a target opens a malicious email attachment.


D.

An intruder's malware is installed on a target's machine.


Expert Solution
Questions # 126:

Rebecca, a security professional, wants to authenticate employees who use web services for safe and secure communication. In this process, she employs a component of the Web Service Architecture, which is an extension of SOAP, and it can maintain the integrity and confidentiality of SOAP messages.

Which of the following components of the Web Service Architecture is used by Rebecca for securing the communication?

Options:

A.

WSDL


B.

WS Work Processes


C.

WS-Policy


D.

WS-Security


Expert Solution
Questions # 127:

Question # 127

Options:

A.

Vulnerability Scanning


B.

Penetration Testing


C.

Security Policy Implementation


D.

Designing Network Security


Expert Solution
Questions # 128:

Yancey is a network security administrator for a large electric company. He becomes disgruntled after learning that he will be laid off and decides to sabotage the company by placing logic bombs, backdoors, and other malware in the system. He does not care if his actions lead to jail time.

What would Yancey be considered?

Options:

A.

Yancey would be considered a Suicide Hacker


B.

Since he does not care about going to jail, he would be considered a Black Hat


C.

Because Yancey works for the company currently; he would be a White Hat


D.

Yancey is a Hacktivist Hacker since he is standing up to a company that is downsizing


Expert Solution
Questions # 129:

Jim, a professional hacker, targeted an organization that is operating critical Industrial Infrastructure. Jim used Nmap to scan open pons and running services on systems connected to the organization's OT network. He used an Nmap command to identify Ethernet/IP devices connected to the Internet and further gathered Information such as the vendor name, product code and name, device name, and IP address. Which of the following Nmap commands helped Jim retrieve the required information?

Options:

A.

nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >


B.

nmap -Pn -sU -p 44818 --script enip-info < Target IP >


C.

nmap -Pn -sT -p 46824 < Target IP >


D.

nmap -Pn -sT -p 102 --script s7-info < Target IP >


Expert Solution
Questions # 130:

Which of the following is the primary objective of a rootkit?

Options:

A.

It opens a port to provide an unauthorized service


B.

It creates a buffer overflow


C.

It replaces legitimate programs


D.

It provides an undocumented opening in a program


Expert Solution
Questions # 131:

You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?

Options:

A.

Nmap


B.

Cain & Abel


C.

Nessus


D.

Snort


Expert Solution
Questions # 132:

You are performing a penetration test for a client and have gained shell access to a Windows machine on the internal network. You intend to retrieve all DNS records for the internal domain. If the DNS server is at 192.168.10.2 and the domain name is abccorp.local, what command would you type at the nslookup prompt to attempt a zone transfer?

Options:

A.

list server=192.168.10.2 type=all


B.

is-d abccorp.local


C.

lserver 192.168.10.2 -t all


D.

ls -d abccorp.local


Expert Solution
Questions # 133:

What two conditions must a digital signature meet?

Options:

A.

Has to be the same number of characters as a physical signature and must be unique.


B.

Has to be unforgeable, and has to be authentic.


C.

Must be unique and have special characters.


D.

Has to be legible and neat.


Expert Solution
Questions # 134:

Which of the following represents the initial two commands that an IRC client sends to join an IRC network?

Options:

A.

USER, NICK


B.

LOGIN, NICK


C.

USER, PASS


D.

LOGIN, USER


Expert Solution
Questions # 135:

jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

Options:

A.

Wireless sniffing


B.

Piggybacking


C.

Evil twin


D.

Wardriving


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 121-135 out of questions