Ethical Hacking and Countermeasures
Last Update Apr 18, 2024
Total Questions : 614
We are offering FREE 312-50 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-50 free exam questions and then go for complete pool of Ethical Hacking and Countermeasures test questions that will help you more.
Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
Which of the following is an application that requires a host application for replication?
Bluetooth uses which digital modulation technique to exchange information between paired devices?
You went to great lengths to install all the necessary technologies to prevent hacking attacks, such as expensive firewalls, antivirus software, anti-spam systems and intrusion detection/prevention tools in your company's network. You have configured the most secure policies and tightened every device on your network. You are confident that hackers will never be able to gain access to your network with complex security system in place.
Your peer, Peter Smith who works at the same department disagrees with you.
He says even the best network security technologies cannot prevent hackers gaining access to the network because of presence of "weakest link" in the security chain.
What is Peter Smith talking about?
Company A and Company B have just merged and each has its own Public Key Infrastructure (PKI). What must the Certificate Authorities (CAs) establish so that the private PKIs for Company A and Company B trust one another and each private PKI can validate digital certificates from the other company?
You’ve just gained root access to a Centos 6 server after days of trying. What tool should you use to maintain access?
A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?
A certified ethical hacker (CEH) completed a penetration test of the main headquarters of a company almost two months ago, but has yet to get paid. The customer is suffering from financial problems, and the CEH is worried that the company will go out of business and end up not paying. What actions should the CEH take?
A certified ethical hacker (CEH) is approached by a friend who believes her husband is cheating. She offers to pay to break into her husband's email account in order to find proof so she can take him to court. What is the ethical response?
An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor. What should the hacker's next step be before starting work on this job?
A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?
Which initial procedure should an ethical hacker perform after being brought into an organization?
A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?
Which security strategy requires using several, varying methods to protect IT systems against attacks?
Which of the following is a primary service of the U.S. Computer Security Incident Response Team (CSIRT)?
Advanced encryption standard is an algorithm used for which of the following?
An IT security engineer notices that the company’s web server is currently being hacked. What should the engineer do next?
Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the network’s IDS?
A consultant is hired to do physical penetration testing at a large financial company. In the first day of his assessment, the consultant goes to the company`s building dressed like an electrician and waits in the lobby for an employee to pass through the main access gate, then the consultant follows the employee behind to get into the restricted area. Which type of attack did the consultant perform?
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?
Passive reconnaissance involves collecting information through which of the following?
Which United States legislation mandates that the Chief Executive Officer (CEO) and the Chief Financial Officer (CFO) must sign statements verifying the completeness and accuracy of financial reports?
How do employers protect assets with security policies pertaining to employee surveillance activities?
Which type of security document is written with specific step-by-step details?
Which of the following tools would be the best choice for achieving compliance with PCI Requirement 11?
Which of the following guidelines or standards is associated with the credit card industry?
Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?
The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?
To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?
What is the main reason the use of a stored biometric is vulnerable to an attack?
A newly discovered flaw in a software application would be considered which kind of security vulnerability?
What is the name of the international standard that establishes a baseline level of confidence in the security functionality of IT products by providing a set of requirements for evaluation?
Which property ensures that a hash function will not produce the same hashed value for two different messages?
Which type of access control is used on a router or firewall to limit network activity?
During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection is the firewall conducting?
Which of the following business challenges could be solved by using a vulnerability scanner?
Which of the following processes evaluates the adherence of an organization to its stated security policy?
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
Which of the following is a command line packet analyzer similar to GUI-based Wireshark?
Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites.
Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.
In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals? (Choose the test answer.)
Which of the following is a restriction being enforced in “white box testing?”
When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?
Which of the following ensures that updates to policies, procedures, and configurations are made in a controlled and documented fashion?
International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining
Which of the following settings enables Nessus to detect when it is sending too many packets and the network pipe is approaching capacity?
An attacker has been successfully modifying the purchase price of items purchased on the company's web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?
A hacker is attempting to see which IP addresses are currently active on a network. Which NMAP switch would the hacker use?
Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?
When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?
A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?
To send a PGP encrypted message, which piece of information from the recipient must the sender have before encrypting the message?
While checking the settings on the internet browser, a technician finds that the proxy server settings have been checked and a computer is trying to use itself as a proxy server. What specific octet within the subnet does the technician see?
Which of the following describes the characteristics of a Boot Sector Virus?
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
In order to show improvement of security over time, what must be developed?
Which of the following programs is usually targeted at Microsoft Office products?
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?