Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 12 out of 14 pages
Viewing questions 221-240 out of questions
Questions # 221:

A penetration tester is hired to do a risk assessment of a company's DMZ.  The rules of engagement states that the penetration test be done from an external IP address with no prior knowledge of the internal IT systems.  What kind of test is being performed?

Options:

A.

white box


B.

grey box


C.

red box


D.

black box


Expert Solution
Questions # 222:

WPA2 uses AES for wireless data encryption at which of the following encryption levels?

Options:

A.

64 bit and CCMP


B.

128 bit and CRC


C.

128 bit and CCMP


D.

128 bit and TKIP


Expert Solution
Questions # 223:

Which security strategy requires using several, varying methods to protect IT systems against attacks?

Options:

A.

Defense in depth


B.

Three-way handshake


C.

Covert channels


D.

Exponential backoff algorithm


Expert Solution
Questions # 224:

A botnet can be managed through which of the following?

Options:

A.

IRC


B.

E-Mail


C.

Linkedin and Facebook


D.

A vulnerable FTP server


Expert Solution
Questions # 225:

What is one thing a tester can do to ensure that the software is trusted and is not changing or tampering with critical data on the back end of a system it is loaded on?

Options:

A.

Proper testing


B.

Secure coding principles


C.

Systems security and architecture review


D.

Analysis of interrupts within the software


Expert Solution
Questions # 226:

Which set of access control solutions implements two-factor authentication?

Options:

A.

USB token and PIN


B.

Fingerprint scanner and retina scanner


C.

Password and PIN


D.

Account and password


Expert Solution
Questions # 227:

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the company’s internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?

Options:

A.

SSL


B.

Mutual authentication


C.

IPSec


D.

Static IP addresses


Expert Solution
Questions # 228:

ICMP ping and ping sweeps are used to check for active systems and to check

Options:

A.

if ICMP ping traverses a firewall.


B.

the route that the ICMP ping took.


C.

the location of the switchport in relation to the ICMP ping.


D.

the number of hops an ICMP ping takes to reach a destination.


Expert Solution
Questions # 229:

Which of the following is a preventive control?

Options:

A.

Smart card authentication


B.

Security policy


C.

Audit trail


D.

Continuity of operations plan


Expert Solution
Questions # 230:

When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets where the Source IP address and Destination IP address are the same. There have been no alerts sent via email or logged in the IDS. Which type of an alert is this?

Options:

A.

False positive


B.

False negative


C.

True positive


D.

True negative


Expert Solution
Questions # 231:

A tester has been hired to do a web application security test. The tester notices that the site is dynamic and must make use of a back end database.

In order for the tester to see if SQL injection is possible, what is the first character that the tester should use to attempt breaking a valid SQL request?

Options:

A.

Semicolon


B.

Single quote


C.

Exclamation mark


D.

Double quote


Expert Solution
Questions # 232:

Hampton is the senior security analyst for the city of Columbus in Ohio. His primary responsibility is to ensure that all physical and logical aspects of the city's computer network are secure from all angles. Bill is an IT technician that works with Hampton in the same IT department. Bill's primary responsibility is to keep PC's and servers up to date and to keep track of all the agency laptops that the company owns and lends out to its employees. After Bill setup a wireless network for the agency, Hampton made sure that everything was secure. He instituted encryption, rotating keys, turned off SSID broadcasting, and enabled MAC filtering. According to agency policy, only company laptops are allowed to use the wireless network, so Hampton entered all the MAC addresses for those laptops into the wireless security utility so that only those laptops should be able to access the wireless network.

Hampton does not keep track of all the laptops, but he is pretty certain that the agency only purchases Dell laptops. Hampton is curious about this because he notices Bill working on a Toshiba laptop one day and saw that he was on the Internet. Instead of jumping to conclusions, Hampton decides to talk to Bill's boss and see if they had purchased a Toshiba laptop instead of the usual Dell. Bill's boss said no, so now Hampton is very curious to see how Bill is accessing the Internet. Hampton does site surveys every couple of days, and has yet to see any outside wireless network signals inside the company's building.

How was Bill able to get Internet access without using an agency laptop?

Options:

A.

Bill spoofed the MAC address of Dell laptop


B.

Bill connected to a Rogue access point


C.

Toshiba and Dell laptops share the same hardware address


D.

Bill brute forced the Mac address ACLs


Expert Solution
Questions # 233:

What type of Virus is shown here?

Question # 233

Options:

A.

Macro Virus


B.

Cavity Virus


C.

Boot Sector Virus


D.

Metamorphic Virus


E.

Sparse Infector Virus


Expert Solution
Questions # 234:

Steve scans the network for SNMP enabled devices. Which port number Steve should scan?

Options:

A.

150


B.

161


C.

169


D.

69


Expert Solution
Questions # 235:

What is the IV key size used in WPA2?

Options:

A.

32


B.

24


C.

16


D.

48


E.

128


Expert Solution
Questions # 236:

John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame?

Options:

A.

0xFFFFFFFFFFFF


B.

0xDDDDDDDDDDDD


C.

0xAAAAAAAAAAAA


D.

0xBBBBBBBBBBBB


Expert Solution
Questions # 237:

A Trojan horse is a destructive program that masquerades as a benign application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but in addition to the expected function steals information or harms the system.

Question # 237

The challenge for an attacker is to send a convincing file attachment to the victim, which gets easily executed on the victim machine without raising any suspicion. Today's end users are quite knowledgeable about malwares and viruses. Instead of sending games and fun executables, Hackers today are quite successful in spreading the Trojans using Rogue security software.

What is Rogue security software?

Options:

A.

A flash file extension to Firefox that gets automatically installed when a victim visits rogue software disabling websites


B.

A Fake AV program that claims to rid a computer of malware, but instead installs spyware or other malware onto the computer. This kind of software is known as rogue security software.


C.

Rogue security software is based on social engineering technique in which the attackers lures victim to visit spear phishing websites


D.

This software disables firewalls and establishes reverse connecting tunnel between the victim's machine and that of the attacker


Expert Solution
Questions # 238:

This is an example of whois record.

Question # 238

Sometimes a company shares a little too much information on their organization through public domain records. Based on the above whois record, what can an attacker do? (Select 2 answers)

Options:

A.

Search engines like Google, Bing will expose information listed on the WHOIS record


B.

An attacker can attempt phishing and social engineering on targeted individuals using the information from WHOIS record


C.

Spammers can send unsolicited e-mails to addresses listed in the WHOIS record


D.

IRS Agents will use this information to track individuals using the WHOIS record information


Expert Solution
Questions # 239:

Finding tools to run dictionary and brute forcing attacks against FTP and Web servers is an easy task for hackers. They use tools such as arhontus or brutus to break into remote servers.

Question # 239

A command such as this, will attack a given 10.0.0.34 FTP and Telnet servers simultaneously with a list of passwords and a single login namE. linksys. Many FTP-specific password-guessing tools are also available from major security sites.

What defensive measures will you take to protect your network from these attacks?

Options:

A.

Never leave a default password


B.

Never use a password that can be found in a dictionary


C.

Never use a password related to your hobbies, pets, relatives, or date of birth.


D.

Use a word that has more than 21 characters from a dictionary as the password


E.

Never use a password related to the hostname, domain name, or anything else that can be found with whois


Expert Solution
Questions # 240:

Study the snort rule given below and interpret the rule.

alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msG. "mountd access";)

Options:

A.

An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111


B.

An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet


C.

An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet


D.

An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111


Expert Solution
Viewing page 12 out of 14 pages
Viewing questions 221-240 out of questions