Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 81-100 out of questions
Questions # 81:

Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?

Options:

A.

Certificate issuance


B.

Certificate validation


C.

Certificate cryptography


D.

Certificate revocation


Expert Solution
Questions # 82:

Which command line switch would be used in NMAP to perform operating system detection?

Options:

A.

-OS


B.

-sO


C.

-sP


D.

-O


Expert Solution
Questions # 83:

Which of the following scanning tools is specifically designed to find potential exploits in Microsoft Windows products?

Options:

A.

Microsoft Security Baseline Analyzer


B.

Retina  


C.

Core Impact


D.

Microsoft Baseline Security Analyzer


Expert Solution
Questions # 84:

A company firewall engineer has configured a new DMZ to allow public systems to be located away from the internal network. The engineer has three security zones set:

Untrust (Internet) – (Remote network = 217.77.88.0/24)

DMZ (DMZ) – (11.12.13.0/24)

Trust (Intranet) – (192.168.0.0/24)

The engineer wants to configure remote desktop access from a fixed IP on the remote network to a remote desktop server in the DMZ. Which rule would best fit this requirement?

Options:

A.

Permit  217.77.88.0/24  11.12.13.0/24 RDP 3389


B.

Permit  217.77.88.12    11.12.13.50     RDP 3389


C.

Permit  217.77.88.12    11.12.13.0/24 RDP 3389


D.

Permit  217.77.88.0/24  11.12.13.50     RDP 3389


Expert Solution
Questions # 85:

The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers.  What should the security team do to determine which alerts to check first?

Options:

A.

Investigate based on the maintenance schedule of the affected systems.


B.

Investigate based on the service level agreements of the systems.


C.

Investigate based on the potential effect of the incident.


D.

Investigate based on the order that the alerts arrived in.


Expert Solution
Questions # 86:

Smart cards use which protocol to transfer the certificate in a secure manner?

Options:

A.

Extensible Authentication Protocol (EAP)


B.

Point to Point Protocol (PPP)


C.

Point to Point Tunneling Protocol (PPTP)


D.

Layer 2 Tunneling Protocol (L2TP)


Expert Solution
Questions # 87:

What statement is true regarding LM hashes?

Options:

A.

LM hashes consist in 48 hexadecimal characters.


B.

LM hashes are based on AES128 cryptographic standard.


C.

Uppercase characters in the password are converted to lowercase.


D.

LM hashes are not generated when the password length exceeds 15 characters.


Expert Solution
Questions # 88:

Which of the following ensures that updates to policies, procedures, and configurations are made in a controlled and documented fashion?

Options:

A.

Regulatory compliance


B.

Peer review


C.

Change management


D.

Penetration testing


Expert Solution
Questions # 89:

A bank stores and processes sensitive privacy information related to home loans.  However, auditing has never been enabled on the system.  What is the first step that the bank should take before enabling the audit feature?

Options:

A.

Perform a vulnerability scan of the system.


B.

Determine the impact of enabling the audit feature.


C.

Perform a cost/benefit analysis of the audit feature.


D.

Allocate funds for staffing of audit log review.


Expert Solution
Questions # 90:

Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process.  Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

Options:

A.

768 bit key


B.

1025 bit key


C.

1536 bit key


D.

2048 bit key


Expert Solution
Questions # 91:

The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:

Time:Mar 13 17:30:15 Port:20 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:17 Port:21 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:19 Port:22 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:21 Port:23 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:22 Port:25 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:23 Port:80 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

Time:Mar 13 17:30:30 Port:443 Source:192.168.1.103 Destination:192.168.1.106 Protocol:TCP

What type of activity has been logged?

Options:

A.

Port scan targeting 192.168.1.103


B.

Teardrop attack targeting 192.168.1.106


C.

Denial of service attack targeting 192.168.1.103


D.

Port scan targeting 192.168.1.106


Expert Solution
Questions # 92:

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?

Options:

A.

Sender's public key


B.

Receiver's private key


C.

Receiver's public key


D.

Sender's private key


Expert Solution
Questions # 93:

What is the main difference between a “Normal” SQL Injection and a “Blind” SQL Injection vulnerability?

Options:

A.

The request to the web server is not visible to the administrator of the vulnerable application.


B.

The attack is called “Blind” because, although the application properly filters user input, it is still vulnerable to code injection.


C.

The successful attack does not show an error message to the administrator of the affected application.


D.

The vulnerable application does not display errors with information about the injection results to the attacker.


Expert Solution
Questions # 94:

International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining

Options:

A.

guidelines and practices for security controls.


B.

financial soundness and business viability metrics.


C.

standard best practice for configuration management.


D.

contract agreement writing standards.


Expert Solution
Questions # 95:

What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?

Options:

A.

 Passive


B.

 Reflective


C.

Active


D.

Distributive


Expert Solution
Questions # 96:

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

Options:

A.

Public-key cryptosystems are faster than symmetric-key cryptosystems.


B.

Public-key cryptosystems distribute public-keys within digital signatures.


C.

Public-key cryptosystems do not require a secure key distribution channel.


D.

Public-key cryptosystems do not provide technical non-repudiation via digital signatures.


Expert Solution
Questions # 97:

Which of the following is an advantage of utilizing security testing methodologies to conduct a security audit?

Options:

A.

They provide a repeatable framework.


B.

Anyone can run the command line scripts.


C.

They are available at low cost.


D.

They are subject to government regulation.


Expert Solution
Questions # 98:

Which of the following items is unique to the N-tier architecture method of designing software applications?

Options:

A.

Application layers can be separated, allowing each layer to be upgraded independently from other layers.


B.

It is compatible with various databases including Access, Oracle, and SQL.


C.

Data security is tied into each layer and must be updated for all layers when any upgrade is performed.


D.

Application layers can be written in C, ASP.NET, or Delphi without any performance loss.


Expert Solution
Questions # 99:

Which results will be returned with the following Google search query?

site:target.com -site:Marketing.target.com accounting

Options:

A.

Results matching all words in the query


B.

Results matching “accounting” in domain target.com but not on the site Marketing.target.com


C.

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting


D.

Results for matches on target.com and Marketing.target.com that include the word “accounting”


Expert Solution
Questions # 100:

Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?

Options:

A.

Ensure all files have at least a 755 or more restrictive permissions.


B.

Configure rules using ipchains.


C.

Configure and enable portsentry on his server.


D.

Install an intrusion detection system on her computer such as Snort.


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 81-100 out of questions