Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 121-140 out of questions
Questions # 121:

What is the tool Firewalk used for?

Options:

A.

To test the IDS for proper operation


B.

To test a firewall for proper operation


C.

To determine what rules are in place for a firewall


D.

To test the webserver configuration


E.

Firewalk is a firewall auto configuration tool


Expert Solution
Questions # 122:

You wish to determine the operating system and type of web server being used. At the same time you wish to arouse no suspicion within the target organization.

While some of the methods listed below work, which holds the least risk of detection?

Options:

A.

Make some phone calls and attempt to retrieve the information using social engineering.


B.

Use nmap in paranoid mode and scan the web server.


C.

Telnet to the web server and issue commands to illicit a response.


D.

Use the netcraft web site look for the target organization’s web site.


Expert Solution
Questions # 123:

Bubba has just accessed he preferred ecommerce web site and has spotted an item that he would like to buy. Bubba considers the price a bit too steep. He looks at the source code of the webpage and decides to save the page locally, so that he can modify the page variables. In the context of web application security, what do you think Bubba has changes?

Options:

A.

A hidden form field value.


B.

A hidden price value.


C.

An integer variable.


D.

A page cannot be changed locally, as it is served by a web server.


Expert Solution
Questions # 124:

On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned. How is it possible to list processes and uids associated with them in a more reliable manner?

Options:

A.

Use "Is"


B.

Use "lsof"


C.

Use "echo"


D.

Use "netstat"


Expert Solution
Questions # 125:

What is a primary advantage a hacker gains by using encryption or programs such as Loki?

Options:

A.

It allows an easy way to gain administrator rights


B.

It is effective against Windows computers


C.

It slows down the effective response of an IDS


D.

IDS systems are unable to decrypt it


E.

Traffic will not be modified in transit


Expert Solution
Questions # 126:

A client has approached you with a penetration test requirements. They are concerned with the possibility of external threat, and have invested considerable resources in protecting their Internet exposure. However, their main concern is the possibility of an employee elevating his/her privileges and gaining access to information outside of their respective department.

What kind of penetration test would you recommend that would best address the client’s concern?

Options:

A.

A Black Box test


B.

A Black Hat test


C.

A Grey Box test


D.

A Grey Hat test


E.

A White Box test


F.

A White Hat test


Expert Solution
Questions # 127:

Which of the following is NOT true of cryptography?

Options:

A.

Science of protecting information by encoding it into an unreadable format


B.

Method of storing and transmitting data in a form that only those it is intended for can read and process


C.

Most (if not all) algorithms can be broken by both technical and non-technical means


D.

An effective way of protecting sensitive information in storage but not in transit


Expert Solution
Questions # 128:

_________ ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at.

Options:

A.

Mandatory Access Control


B.

Authorized Access Control


C.

Role-based Access Control


D.

Discretionary Access Control


Expert Solution
Questions # 129:

Eric notices repeated probes to port 1080. He learns that the protocol being used is designed to allow a host outside of a firewall to connect transparently and securely through the firewall. He wonders if his firewall has been breached. What would be your inference?

Options:

A.

Eric network has been penetrated by a firewall breach


B.

The attacker is using the ICMP protocol to have a covert channel


C.

Eric has a Wingate package providing FTP redirection on his network


D.

Somebody is using SOCKS on the network to communicate through the firewall


Expert Solution
Questions # 130:

John is discussing security with Jane. Jane had mentioned to John earlier that she suspects an LKM has been installed on her server. She believes this is the reason that the server has been acting erratically lately. LKM stands for Loadable Kernel Module.

What does this mean in the context of Linux Security?

Options:

A.

Loadable Kernel Modules are a mechanism for adding functionality to a file system without requiring a kernel recompilation.


B.

Loadable Kernel Modules are a mechanism for adding functionality to an operating-system kernel after it has been recompiled and the system rebooted.


C.

Loadable Kernel Modules are a mechanism for adding auditing to an operating-system kernel without requiring a kernel recompilation.


D.

Loadable Kernel Modules are a mechanism for adding functionality to an operating-system kernel without requiring a kernel recompilation.


Expert Solution
Questions # 131:

In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob’s public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message.

Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob’s public key and use it to verify Bob’s signature, they cannot discover Bob’s private key and use it to forge digital signatures.

What does this principle refer to?

Options:

A.

Irreversibility


B.

Non-repudiation


C.

Symmetry


D.

Asymmetry


Expert Solution
Questions # 132:

Which of the following is NOT a valid NetWare access level?

Options:

A.

Not Logged in


B.

Logged in


C.

Console Access


D.

Administrator


Expert Solution
Questions # 133:

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed. Which security policy must the security analyst check to see if dial-out modems are allowed?

Options:

A.

Firewall-management policy


B.

Acceptable-use policy


C.

Remote-access policy


D.

Permissive policy


Expert Solution
Questions # 134:

An attacker is attempting to telnet into a corporation's system in the DMZ. The attacker doesn't want to get caught and is spoofing his IP address. After numerous tries he remains unsuccessful in connecting to the system. The attacker rechecks that the target system is actually listening on Port 23 and he verifies it with both nmap and hping2. He is still unable to connect to the target system. What could be the reason?

Options:

A.

The firewall is blocking port 23 to that system


B.

He needs to use an automated tool to telnet in


C.

He cannot spoof his IP and successfully use TCP


D.

He is attacking an operating system that does not reply to telnet even when open


Expert Solution
Questions # 135:

SSL has been seen as the solution to a lot of common security problems. Administrator will often time make use of SSL to encrypt communications from points A to point B. Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?

Options:

A.

SSL is redundant if you already have IDS's in place


B.

SSL will trigger rules at regular interval and force the administrator to turn them off


C.

SSL will slow down the IDS while it is breaking the encryption to see the packet content


D.

SSL will blind the content of the packet and Intrusion Detection Systems will not be able to detect them


Expert Solution
Questions # 136:

What type of port scan is represented here.

Question # 136

Options:

A.

Stealth Scan


B.

Full Scan


C.

XMAS Scan


D.

FIN Scan


Expert Solution
Questions # 137:

WWW wanderers or spiders are programs that traverse many pages in the World Wide Web by recursively retrieving linked pages. Search engines like Google, frequently spider web pages for indexing. How will you stop web spiders from crawling certain directories on your website?

Options:

A.

Place robots.txt file in the root of your website with listing of directories that you don't want to be crawled


B.

Place authentication on root directories that will prevent crawling from these spiders


C.

Enable SSL on the restricted directories which will block these spiders from crawling


D.

Place "HTTP:NO CRAWL" on the html pages that you don't want the crawlers to index


Expert Solution
Questions # 138:

On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?

Options:

A.

nessus +


B.

nessus *s


C.

nessus &


D.

nessus -d


Expert Solution
Questions # 139:

You want to perform advanced SQL Injection attack against a vulnerable website. You are unable to perform command shell hacks on this server. What must be enabled in SQL Server to launch these attacks?

Options:

A.

System services


B.

EXEC master access


C.

xp_cmdshell


D.

RDC


Expert Solution
Questions # 140:

What is the main reason the use of a stored biometric is vulnerable to an attack?

Options:

A.

The digital representation of the biometric might not be unique, even if the physical characteristic is unique.


B.

Authentication using a stored biometric compares a copy to a copy instead of the original to a copy.


C.

A stored biometric is no longer "something you are" and instead becomes "something you have".


D.

A stored biometric can be stolen and used by an attacker to impersonate the individual identified by the biometric.


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 121-140 out of questions