Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions
Questions # 161:

Which of the following Exclusive OR transforms bits is NOT correct?

Options:

A.

0 xor 0 = 0


B.

1 xor 0 = 1


C.

1 xor 1 = 1


D.

0 xor 1 = 1


Expert Solution
Questions # 162:

Which of the following are password cracking tools? (Choose three.)

Options:

A.

BTCrack


B.

John the Ripper


C.

KerbCrack


D.

Nikto


E.

Cain and Abel


F.

Havij


Expert Solution
Questions # 163:

Neil is an IT security consultant working on contract for Davidson Avionics. Neil has been hired to audit the network of Davidson Avionics. He has been given permission to perform any tests necessary. Neil has created a fake company ID badge and uniform. Neil waits by one of the company's entrance doors and follows an employee into the office after they use their valid access card to gain entrance. What type of social engineering attack has Neil employed here?

Options:

A.

Neil has used a tailgating social engineering attack to gain access to the offices


B.

He has used a piggybacking technique to gain unauthorized access


C.

This type of social engineering attack is called man trapping


D.

Neil is using the technique of reverse social engineering to gain access to the offices of Davidson Avionics


Expert Solution
Questions # 164:

Which type of antenna is used in wireless communication?

Options:

A.

Omnidirectional


B.

Parabolic


C.

Uni-directional


D.

Bi-directional


Expert Solution
Questions # 165:

You are writing security policy that hardens and prevents Footprinting attempt by Hackers. Which of the following countermeasures will NOT be effective against this attack?

Options:

A.

Configure routers to restrict the responses to Footprinting requests


B.

Configure Web Servers to avoid information leakage and disable unwanted protocols


C.

Lock the ports with suitable Firewall configuration


D.

Use an IDS that can be configured to refuse suspicious traffic and pick up Footprinting patterns


E.

Evaluate the information before publishing it on the Website/Intranet


F.

Monitor every employee computer with Spy cameras, keyloggers and spy on them


G.

Perform Footprinting techniques and remove any sensitive information found on DMZ sites


Expert Solution
Questions # 166:

What are the two basic types of attacks? (Choose two.

Options:

A.

DoS


B.

Passive


C.

Sniffing


D.

Active


E.

Cracking


Expert Solution
Questions # 167:

What is the proper response for a FIN scan if the port is closed?

Options:

A.

SYN


B.

ACK


C.

FIN


D.

PSH


E.

RST


Expert Solution
Questions # 168:

What does the term “Ethical Hacking” mean?

Options:

A.

Someone who is hacking for ethical reasons.


B.

Someone who is using his/her skills for ethical reasons.


C.

Someone who is using his/her skills for defensive purposes.


D.

Someone who is using his/her skills for offensive purposes.


Expert Solution
Questions # 169:

What are two things that are possible when scanning UDP ports? (Choose two.

Options:

A.

A reset will be returned


B.

An ICMP message will be returned


C.

The four-way handshake will not be completed


D.

An RFC 1294 message will be returned


E.

Nothing


Expert Solution
Questions # 170:

While performing a ping sweep of a subnet you receive an ICMP reply of Code 3/Type 13 for all the pings sent out.

What is the most likely cause behind this response?

Options:

A.

The firewall is dropping the packets.


B.

An in-line IDS is dropping the packets.


C.

A router is blocking ICMP.


D.

The host does not respond to ICMP packets.


Expert Solution
Questions # 171:

While investigating a claim of a user downloading illegal material, the investigator goes through the files on the suspect's workstation. He comes across a file that is just called "file.txt" but when he opens it, he finds the following:

Question # 171

What can he infer from this file?

Options:

A.

A picture that has been renamed with a .txt extension


B.

An encrypted file


C.

An encoded file


D.

A buffer overflow


Expert Solution
Questions # 172:

While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?

Options:

A.

Scan more slowly.


B.

Do not scan the broadcast IP.


C.

Spoof the source IP address.


D.

Only scan the Windows systems.


Expert Solution
Questions # 173:

Which address translation scheme would allow a single public IP address to always correspond to a single machine on an internal network, allowing "server publishing"?

Options:

A.

Overloading Port Address Translation


B.

Dynamic Port Address Translation


C.

Dynamic Network Address Translation


D.

Static Network Address Translation


Expert Solution
Questions # 174:

Which of the following is considered an acceptable option when managing a risk?

Options:

A.

Reject the risk.


B.

Deny the risk.


C.

Mitigate the risk.


D.

Initiate the risk.


Expert Solution
Questions # 175:

__________ is found in all versions of NTFS and is described as the ability to fork file data into existing files without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows Explorer

Options:

A.

Alternate Data Streams


B.

Merge Streams


C.

Steganography


D.

NetBIOS vulnerability


Expert Solution
Questions # 176:

John is using a special tool on his Linux platform that has a signature database and is therefore able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts. Additionally, the database detects DDoS zombies and Trojans. What would be the name of this multifunctional tool?

Options:

A.

nmap


B.

hping


C.

nessus


D.

make


Expert Solution
Questions # 177:

Which of the following tools can be used to perform a zone transfer?

Options:

A.

NSLookup


B.

Finger


C.

Dig


D.

Sam Spade


E.

Host


F.

Netcat


G.

Neotrace


Expert Solution
Questions # 178:

One of your team members has asked you to analyze the following SOA record. What is the version?

Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600

3600 604800 2400.

Options:

A.

200303028


B.

3600


C.

604800


D.

2400


E.

60


F.

4800


Expert Solution
Questions # 179:

To what does “message repudiation” refer to what concept in the realm of email security?

Options:

A.

Message repudiation means a user can validate which mail server or servers a message was passed through.


B.

Message repudiation means a user can claim damages for a mail message that damaged their reputation.


C.

Message repudiation means a recipient can be sure that a message was sent from a particular person.


D.

Message repudiation means a recipient can be sure that a message was sent from a certain host.


E.

Message repudiation means a sender can claim they did not actually send a particular message.


Expert Solution
Questions # 180:

Why would an attacker want to perform a scan on port 137?

Options:

A.

To discover proxy servers on a network


B.

To disrupt the NetBIOS SMB service on the target host


C.

To check for file and print sharing on Windows systems


D.

To discover information about a target host using NBTSTAT


Expert Solution
Viewing page 9 out of 14 pages
Viewing questions 161-180 out of questions