Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 61-80 out of questions
Questions # 61:

Under what conditions does a secondary name server request a zone transfer from a primary name server?

Options:

A.

When a primary SOA is higher that a secondary SOA


B.

When a secondary SOA is higher that a primary SOA


C.

When a primary name server has had its service restarted


D.

When a secondary name server has had its service restarted


E.

When the TTL falls to zero


Expert Solution
Questions # 62:

What tool can crack Windows SMB passwords simply by listening to network traffic?

Select the best answer.

Options:

A.

This is not possible


B.

Netbus


C.

NTFSDOS


D.

L0phtcrack


Expert Solution
Questions # 63:

A file integrity program such as Tripwire protects against Trojan horse attacks by:

Options:

A.

Automatically deleting Trojan horse programs


B.

Rejecting packets generated by Trojan horse programs


C.

Using programming hooks to inform the kernel of Trojan horse behavior


D.

Helping you catch unexpected changes to a system utility file that might indicate it had been replaced by a Trojan horse


Expert Solution
Questions # 64:

Exhibit:

ettercap –NCLzs --quiet

What does the command in the exhibit do in “Ettercap”?

Options:

A.

This command will provide you the entire list of hosts in the LAN


B.

This command will check if someone is poisoning you and will report its IP.


C.

This command will detach from console and log all the collected passwords from the network to a file.


D.

This command broadcasts ping to scan the LAN instead of ARP request of all the subnet IPs.


Expert Solution
Questions # 65:

What did the following commands determine?

C: user2sid \earth guest

S-1-5-21-343818398-789336058-1343024091-501

C:sid2user 5 21 343818398 789336058 1343024091 500

Name is Joe

Domain is EARTH

Options:

A.

That the Joe account has a SID of 500


B.

These commands demonstrate that the guest account has NOT been disabled


C.

These commands demonstrate that the guest account has been disabled


D.

That the true administrator is Joe


E.

Issued alone, these commands prove nothing


Expert Solution
Questions # 66:

Exhibit:

Question # 66

You have captured some packets in Ethereal. You want to view only packets sent from 10.0.0.22. What filter will you apply?

Options:

A.

ip = 10.0.0.22


B.

ip.src == 10.0.0.22


C.

ip.equals 10.0.0.22


D.

ip.address = 10.0.0.22


Expert Solution
Questions # 67:

Which Open Web Application Security Project (OWASP) implements a web application full of known vulnerabilities?

Options:

A.

WebBugs


B.

WebGoat


C.

VULN_HTML


D.

WebScarab


Expert Solution
Questions # 68:

An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?

Options:

A.

g++ hackersExploit.cpp -o calc.exe


B.

g++ hackersExploit.py -o calc.exe


C.

g++ -i hackersExploit.pl -o calc.exe


D.

g++ --compile –i hackersExploit.cpp -o calc.exe


Expert Solution
Questions # 69:

Windows file servers commonly hold sensitive files, databases, passwords and more.  Which of the following choices would be a common vulnerability that usually exposes them?

Options:

A.

Cross-site scripting


B.

SQL injection


C.

Missing patches


D.

CRLF injection


Expert Solution
Questions # 70:

What is the purpose of conducting security assessments on network resources?

Options:

A.

Documentation


B.

Validation


C.

Implementation


D.

Management


Expert Solution
Questions # 71:

After gaining access to the password hashes used to protect access to a web based application, knowledge of which cryptographic algorithms would be useful to gain access to the application?

Options:

A.

SHA1


B.

Diffie-Helman


C.

RSA


D.

AES


Expert Solution
Questions # 72:

How does an operating system protect the passwords used for account logins?

Options:

A.

The operating system performs a one-way hash of the passwords.


B.

The operating system stores the passwords in a secret file that users cannot find.


C.

The operating system encrypts the passwords, and decrypts them when needed.


D.

The operating system stores all passwords in a protected segment of non-volatile memory.


Expert Solution
Questions # 73:

Which type of scan is used on the eye to measure the layer of blood vessels?

Options:

A.

Facial recognition scan


B.

Retinal scan


C.

Iris scan


D.

Signature kinetics scan


Expert Solution
Questions # 74:

Which of the following guidelines or standards is associated with the credit card industry?

Options:

A.

Control Objectives for Information and Related Technology (COBIT)


B.

Sarbanes-Oxley Act (SOX)


C.

Health Insurance Portability and Accountability Act (HIPAA)


D.

Payment Card Industry Data Security Standards (PCI DSS)


Expert Solution
Questions # 75:

Which command lets a tester enumerate alive systems in a class C network via ICMP using native Windows tools?

Options:

A.

ping 192.168.2.


B.

ping 192.168.2.255


C.

for %V in (1 1 255) do PING 192.168.2.%V


D.

for /L %V in (1 1 254) do PING -n 1 192.168.2.%V | FIND /I "Reply"


Expert Solution
Questions # 76:

How do employers protect assets with security policies pertaining to employee surveillance activities?

Options:

A.

Employers promote monitoring activities of employees as long as the employees demonstrate trustworthiness.


B.

Employers use informal verbal communication channels to explain employee monitoring activities to employees.


C.

Employers use network surveillance to monitor employee email traffic, network access, and to record employee keystrokes.


D.

Employers provide employees written statements that clearly discuss the boundaries of monitoring activities and consequences.


Expert Solution
Questions # 77:

When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's computer to update the router configuration. What type of an alert is this?

Options:

A.

False positive 


B.

False negative


C.

True positve


D.

True negative


Expert Solution
Questions # 78:

When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?

Options:

A.

A bottom-up approach


B.

A top-down approach


C.

A senior creation approach


D.

An IT assurance approach


Expert Solution
Questions # 79:

A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash.  The technician researches the bug and discovers that no one else experienced the problem.  What is the appropriate next step?

Options:

A.

Ignore the problem completely and let someone else deal with it.


B.

Create a document that will crash the computer when opened and send it to friends.


C.

Find an underground bulletin board and attempt to sell the bug to the highest bidder.


D.

Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix.


Expert Solution
Questions # 80:

Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a 32-bit address to a 48-bit address?

Options:

A.

ICPM


B.

ARP


C.

RARP


D.

ICMP


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 61-80 out of questions