Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Certified Ethical Hacker Exam (CEH v11) Question and Answers

Certified Ethical Hacker Exam (CEH v11)

Last Update Apr 24, 2024
Total Questions : 528

We are offering FREE 312-50v11 ECCouncil exam questions. All you do is to just go and sign up. Give your details, prepare 312-50v11 free exam questions and then go for complete pool of Certified Ethical Hacker Exam (CEH v11) test questions that will help you more.

312-50v11 pdf

312-50v11 PDF

$35  $99.99
312-50v11 Engine

312-50v11 Testing Engine

$42  $119.99
312-50v11 PDF + Engine

312-50v11 PDF + Testing Engine

$56  $159.99
Questions 1

Sophia is a shopping enthusiast who spends significant time searching for trendy outfits online. Clark, an attacker, noticed her activities several times and sent a fake email containing a deceptive page link to her social media page displaying all-new and trendy outfits. In excitement, Sophia clicked on the malicious link and logged in to that page using her valid credentials. Which of the following tools is employed by Clark to create the spoofed email?

Options:

A.  

PyLoris

B.  

Slowloris

C.  

Evilginx

D.  

PLCinject

Discussion 0
Questions 2

Richard, an attacker, aimed to hack loT devices connected to a target network. In this process. Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the loT network, which repeats the captured signals of the devices. What Is the type of attack performed by Richard In the above scenario?

Options:

A.  

Side-channel attack

B.  

Replay attack

C.  

CrypTanalysis attack

D.  

Reconnaissance attack

Discussion 0
Questions 3

Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session 10 to the target employee. The session ID links the target employee to Boneys account page without disclosing any information to the victim. When the target employee clicks on the link, all the sensitive payment details entered in a form are linked to Boneys account. What is the attack performed by Boney in the above scenario?

Options:

A.  

Session donation attack

B.  

Session fixation attack

C.  

Forbidden attack

D.  

CRIME attack

Discussion 0
Questions 4

Joel, a professional hacker, targeted a company and identified the types of websites frequently visited by its employees. Using this information, he searched for possible loopholes in these websites and injected a malicious script that can redirect users from the web page and download malware onto a victim's machine. Joel waits for the victim to access the infected web application so as to compromise the victim's machine. Which of the following techniques is used by Joel in the above scenario?

Options:

A.  

DNS rebinding attack

B.  

Clickjacking attack

C.  

MarioNet attack

D.  

Watering hole attack

Discussion 0
Questions 5

What information security law or standard aims at protecting stakeholders and the general public from accounting errors and fraudulent activities within organizations?

Options:

A.  

PCI-DSS

B.  

FISMA

C.  

SOX

D.  

ISO/I EC 27001:2013

Discussion 0
Questions 6

John, a security analyst working for an organization, found a critical vulnerability on the organization's LAN that allows him to view financial and personal information about the rest of the employees. Before reporting the vulnerability, he examines the information shown by the vulnerability for two days without disclosing any information to third parties or other internal employees. He does so out of curiosity about the other employees and may take advantage of this information later. What would John be considered as?

Options:

A.  

Cybercriminal

B.  

Black hat

C.  

White hat

D.  

Gray hat

Discussion 0
Questions 7

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

Options:

A.  

Switch then acts as hub by broadcasting packets to all machines on the network

B.  

The CAM overflow table will cause the switch to crash causing Denial of Service

C.  

The switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF

D.  

Every packet is dropped and the switch sends out SNMP alerts to the IDS port

Discussion 0
Questions 8

A security analyst is performing an audit on the network to determine if there are any deviations from the security policies in place. The analyst discovers that a user from the IT department had a dial-out modem installed.

Which security policy must the security analyst check to see if dial-out modems are allowed?

Options:

A.  

Firewall-management policy

B.  

Acceptable-use policy

C.  

Permissive policy

D.  

Remote-access policy

Discussion 0
Questions 9

Windows LAN Manager (LM) hashes are known to be weak.

Which of the following are known weaknesses of LM? (Choose three.)

Options:

A.  

Converts passwords to uppercase.

B.  

Hashes are sent in clear text over the network.

C.  

Makes use of only 32-bit encryption.

D.  

Effective length is 7 characters.

Discussion 0
Questions 10

joe works as an it administrator in an organization and has recently set up a cloud computing service for the organization. To implement this service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud service provider, in the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?

Options:

A.  

Cloud booker

B.  

Cloud consumer

C.  

Cloud carrier

D.  

Cloud auditor

Discussion 0
Questions 11

What type of analysis is performed when an attacker has partial knowledge of inner-workings of the application?

Options:

A.  

Black-box

B.  

Announced

C.  

White-box

D.  

Grey-box

Discussion 0
Questions 12

PGP, SSL, and IKE are all examples of which type of cryptography?

Options:

A.  

Digest

B.  

Secret Key

C.  

Public Key

D.  

Hash Algorithm

Discussion 0
Questions 13

Study the snort rule given below and interpret the rule. alert tcp any any --> 192.168.1.0/24 111

(content:"|00 01 86 a5|"; msG. "mountd access";)

Options:

A.  

An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111

B.  

An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet

C.  

An alert is generated when a TCP packet is originated from port 111 of any IP address to the 192.168.1.0 subnet

D.  

An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111

Discussion 0
Questions 14

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

Options:

A.  

A biometric system that bases authentication decisions on behavioral attributes.

B.  

A biometric system that bases authentication decisions on physical attributes.

C.  

An authentication system that creates one-time passwords that are encrypted with secret keys.

D.  

An authentication system that uses passphrases that are converted into virtual passwords.

Discussion 0
Questions 15

What is not a PCI compliance recommendation?

Options:

A.  

Use a firewall between the public network and the payment card data.

B.  

Use encryption to protect all transmission of card holder data over any public network.

C.  

Rotate employees handling credit card transactions on a yearly basis to different departments.

D.  

Limit access to card holder data to as few individuals as possible.

Discussion 0
Questions 16

From the following table, identify the wrong answer in terms of Range (ft).

Standard Range (ft)

802.11a 150-150

802.11b 150-150

802.11g 150-150

802.16 (WiMax) 30 miles

Options:

A.  

802.16 (WiMax)

B.  

802.11g

C.  

802.11b

D.  

802.11a

Discussion 0
Questions 17

An organization is performing a vulnerability assessment tor mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests. What is the type of vulnerability assessment solution that James employed in the above scenario?

Options:

A.  

Product-based solutions

B.  

Tree-based assessment

C.  

Service-based solutions

D.  

inference-based assessment

Discussion 0
Questions 18

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical Information to Johnson's machine. What is the social engineering technique Steve employed in the above scenario?

Options:

A.  

Quid pro quo

B.  

Diversion theft

C.  

Elicitation

D.  

Phishing

Discussion 0
Questions 19

Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites.

Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.

In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals? (Choose the test answer.)

Options:

A.  

Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.

B.  

Hire more computer security monitoring personnel to monitor computer systems and networks.

C.  

Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.

D.  

Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.

Discussion 0
Questions 20

which of the following protocols can be used to secure an LDAP service against anonymous queries?

Options:

A.  

SSO

B.  

RADIUS

C.  

WPA

D.  

NTLM

Discussion 0
Questions 21

A zone file consists of which of the following Resource Records (RRs)?

Options:

A.  

DNS, NS, AXFR, and MX records

B.  

DNS, NS, PTR, and MX records

C.  

SOA, NS, AXFR, and MX records

D.  

SOA, NS, A, and MX records

Discussion 0
Questions 22

While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place. What Web browser-based security vulnerability was exploited to compromise the user?

Options:

A.  

Clickjacking

B.  

Cross-Site Scripting

C.  

Cross-Site Request Forgery

D.  

Web form input validation

Discussion 0
Questions 23

In Trojan terminology, what is a covert channel?

Options:

A.  

A channel that transfers information within a computer system or network in a way that violates the security policy

B.  

A legitimate communication path within a computer system or network for transfer of data

C.  

It is a kernel operation that hides boot processes and services to mask detection

D.  

It is Reverse tunneling technique that uses HTTPS protocol instead of HTTP protocol to establish connections

Discussion 0
Questions 24

What tool can crack Windows SMB passwords simply by listening to network traffic?

Options:

A.  

This is not possible

B.  

Netbus

C.  

NTFSDOS

D.  

L0phtcrack

Discussion 0
Questions 25

This form of encryption algorithm is asymmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?

Options:

A.  

Twofish encryption algorithm

B.  

HMAC encryption algorithm

C.  

IDEA

D.  

Blowfish encryption algorithm

Discussion 0
Questions 26

Bob wants to ensure that Alice can check whether his message has been tampered with. He creates a checksum of the message and encrypts it using asymmetric cryptography. What key does Bob use to encrypt the checksum for accomplishing this goal?

Options:

A.  

Alice's private key

B.  

Alice's public key

C.  

His own private key

D.  

His own public key

Discussion 0
Questions 27

How can you determine if an LM hash you extracted contains a password that is less than 8 characters long?

Options:

A.  

There is no way to tell because a hash cannot be reversed

B.  

The right most portion of the hash is always the same

C.  

The hash always starts with AB923D

D.  

The left most portion of the hash is always the same

E.  

A portion of the hash will be all 0's

Discussion 0
Questions 28

Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?

Options:

A.  

Port 53

B.  

Port 23

C.  

Port 50

D.  

Port 80

Discussion 0
Questions 29

David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to evaluate and control the risks and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities. Which phase of the vulnerability-management life cycle is David currently in?

Options:

A.  

verification

B.  

Risk assessment

C.  

Vulnerability scan

D.  

Remediation

Discussion 0
Questions 30

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-2S6. MMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?

Options:

A.  

WPA2 Personal

B.  

WPA3-Personal

C.  

WPA2-Enterprise

D.  

WPA3-Enterprise

Discussion 0
Questions 31

Gavin owns a white-hat firm and is performing a website security audit for one of his clients. He begins by running a scan which looks for common misconfigurations and outdated software versions. Which of the following tools is he most likely using?

Options:

A.  

Nikto

B.  

Nmap

C.  

Metasploit

D.  

Armitage

Discussion 0
Questions 32

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?

Options:

A.  

Use his own public key to encrypt the message.

B.  

Use Marie's public key to encrypt the message.

C.  

Use his own private key to encrypt the message.

D.  

Use Marie's private key to encrypt the message.

Discussion 0
Questions 33

The collection of potentially actionable, overt, and publicly available information is known as

Options:

A.  

Open-source intelligence

B.  

Real intelligence

C.  

Social intelligence

D.  

Human intelligence

Discussion 0
Questions 34

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

Options:

A.  

Output encoding

B.  

Enforce least privileges

C.  

Whitelist validation

D.  

Blacklist validation

Discussion 0
Questions 35

What is the following command used for?

sqlmap.py-u ,,http://10.10.1.20/?p=1 &forumaction=search" -dbs

Options:

A.  

Creating backdoors using SQL injection

B.  

A Enumerating the databases in the DBMS for the URL

C.  

Retrieving SQL statements being executed on the database

D.  

Searching database statements at the IP address given

Discussion 0
Questions 36

Which of the following is a low-tech way of gaining unauthorized access to systems?

Options:

A.  

Social Engineering

B.  

Eavesdropping

C.  

Scanning

D.  

Sniffing

Discussion 0
Questions 37

One of your team members has asked you to analyze the following SOA record. What is the version?

Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400.) (Choose four.)

Options:

A.  

200303028

B.  

3600

C.  

604800

D.  

2400

E.  

60

F.  

4800

Discussion 0
Questions 38

An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim's data. What type of attack is this?

Options:

A.  

Phishing

B.  

Vlishing

C.  

Spoofing

D.  

DDoS

Discussion 0
Questions 39

To invisibly maintain access to a machine, an attacker utilizes a toolkit that sits undetected In the core components of the operating system. What is this type of rootkit an example of?

Options:

A.  

Mypervisor rootkit

B.  

Kernel toolkit

C.  

Hardware rootkit

D.  

Firmware rootkit

Discussion 0
Questions 40

The company ABC recently contracts a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. Which of the following options can be useful to ensure the integrity of the data?

Options:

A.  

The CFO can use a hash algorithm in the document once he approved the financial statements

B.  

The CFO can use an excel file with a password

C.  

The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure is the same document

D.  

The document can be sent to the accountant using an exclusive USB for that document

Discussion 0
Questions 41

Which of the following describes the characteristics of a Boot Sector Virus?

Options:

A.  

Modifies directory table entries so that directory entries point to the virus code instead of the actual program.

B.  

Moves the MBR to another location on the RAM and copies itself to the original location of the MBR.

C.  

Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR.

D.  

Overwrites the original MBR and only executes the new virus code.

Discussion 0
Questions 42

Which of the following is not a Bluetooth attack?

Options:

A.  

Bluedriving

B.  

Bluesmacking

C.  

Bluejacking

D.  

Bluesnarfing

Discussion 0
Questions 43

While examining audit logs, you discover that people are able to telnet into the SMTP server on port 25. You would like to block this, though you do not see any evidence of an attack or other wrong doing. However, you are concerned about affecting the normal functionality of the email server. From the following options choose how best you can achieve this objective?

Options:

A.  

Block port 25 at the firewall.

B.  

Shut off the SMTP service on the server.

C.  

Force all connections to use a username and password.

D.  

Switch from Windows Exchange to UNIX Sendmail.

E.  

None of the above.

Discussion 0
Questions 44

Fingerprinting an Operating System helps a cracker because:

Options:

A.  

It defines exactly what software you have installed

B.  

It opens a security-delayed window based on the port being scanned

C.  

It doesn't depend on the patches that have been applied to fix existing security holes

D.  

It informs the cracker of which vulnerabilities he may be able to exploit on your system

Discussion 0
Questions 45

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3 encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity and forced the victim to go through the WPA2 four-way handshake to get connected. After the connection was established, the attacker used automated tools to crack WPA2-encrypted messages. What is the attack performed in the above scenario?

Options:

A.  

Timing-based attack

B.  

Side-channel attack

C.  

Downgrade security attack

D.  

Cache-based attack

Discussion 0
Questions 46

Mirai malware targets loT devices. After infiltration, it uses them to propagate and create botnets that then used to launch which types of attack?

Options:

A.  

MITM attack

B.  

Birthday attack

C.  

DDoS attack

D.  

Password attack

Discussion 0
Questions 47

Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target

system, he finds a list of hashed passwords.

Which of the following tools would not be useful for cracking the hashed passwords?

Options:

A.  

John the Ripper

B.  

Hashcat

C.  

netcat

D.  

THC-Hydra

Discussion 0
Questions 48

In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration. If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

Options:

A.  

Full Blown

B.  

Thorough

C.  

Hybrid

D.  

BruteDics

Discussion 0
Questions 49

Don, a student, came across a gaming app in a third-party app store and Installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after Installing the app. What is the attack performed on Don in the above scenario?

Options:

A.  

SMS phishing attack

B.  

SIM card attack

C.  

Agent Smith attack

D.  

Clickjacking

Discussion 0
Questions 50

Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task, Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization's network.

Which type of threat intelligence is used by Roma to secure the internal network?

Options:

A.  

Technical threat intelligence

B.  

Operational threat intelligence

C.  

Tactical threat intelligence

D.  

Strategic threat intelligence

Discussion 0
Questions 51

What is the minimum number of network connections in a multi homed firewall?

Options:

A.  

3

B.  

5

C.  

4

D.  

2

Discussion 0
Questions 52

Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the computer unlocked, didn’t log out from emails or other social media accounts, and etc.

After discussing with his boss, Vlady decided to make some changes to improve the security environment in his company. The first thing that Vlady wanted to do is to make the employees understand the importance of keeping confidential information, such as password, a secret and they should not share it with other persons.

Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

Options:

A.  

Warning to those who write password on a post it note and put it on his/her desk

B.  

Developing a strict information security policy

C.  

Information security awareness training

D.  

Conducting a one to one discussion with the other employees about the importance of information security

Discussion 0
Questions 53

Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

Options:

A.  

Yagi antenna

B.  

Dipole antenna

C.  

Parabolic grid antenna

D.  

Omnidirectional antenna

Discussion 0
Questions 54

OpenSSL on Linux servers includes a command line tool for testing TLS. What is the name of the tool and the correct syntax to connect to a web server?

Options:

A.  

openssl s_client -site www.website.com:443

B.  

openssl_client -site www.website.com:443

C.  

openssl s_client -connect www.website.com:443

D.  

openssl_client -connect www.website.com:443

Discussion 0
Questions 55

A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems.

However, he is unable to capture any logons though he knows that other users are logging in.

What do you think is the most likely reason behind this?

Options:

A.  

There is a NIDS present on that segment.

B.  

Kerberos is preventing it.

C.  

Windows logons cannot be sniffed.

D.  

L0phtcrack only sniffs logons to web servers.

Discussion 0
Questions 56

Robert, a professional hacker, is attempting to execute a fault injection attack on a target IoT device. In this process, he injects faults into the power supply that can be used for remote execution, also causing the skipping of key instructions. He also injects faults into the clock network used for delivering a synchronized signal across the chip.

Which of the following types of fault injection attack is performed by Robert in the above scenario?

Options:

A.  

Frequency/voltage tampering

B.  

Optical, electromagnetic fault injection (EMFI)

C.  

Temperature attack

D.  

Power/clock/reset glitching

Discussion 0
Questions 57

Which of the following provides a security professional with most information about the system’s security posture?

Options:

A.  

Phishing, spamming, sending trojans

B.  

Social engineering, company site browsing tailgating

C.  

Wardriving, warchalking, social engineering

D.  

Port scanning, banner grabbing service identification

Discussion 0
Questions 58

There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution Is for a customer to Join with a group of users or organizations to share a cloud environment. What is this cloud deployment option called?

Options:

A.  

Hybrid

B.  

Community

C.  

Public

D.  

Private

Discussion 0
Questions 59

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

Options:

A.  

SFTP

B.  

Ipsec

C.  

SSL

D.  

FTPS

Discussion 0
Questions 60

What is the common name for a vulnerability disclosure program opened by companies In platforms such as HackerOne?

Options:

A.  

Vulnerability hunting program

B.  

Bug bounty program

C.  

White-hat hacking program

D.  

Ethical hacking program

Discussion 0
Questions 61

Which iOS jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?

Options:

A.  

Tethered jailbreaking

B.  

Semi-tethered jailbreaking

C.  

Untethered jailbreaking

D.  

Semi-Untethered jailbreaking

Discussion 0
Questions 62

Which of the following statements about a zone transfer is correct? (Choose three.)

Options:

A.  

A zone transfer is accomplished with the DNS

B.  

A zone transfer is accomplished with the nslookup service

C.  

A zone transfer passes all zone information that a DNS server maintains

D.  

A zone transfer passes all zone information that a nslookup server maintains

E.  

A zone transfer can be prevented by blocking all inbound TCP port 53 connections

F.  

Zone transfers cannot occur on the Internet

Discussion 0
Questions 63

jane, an ethical hacker. Is testing a target organization's web server and website to identity security loopholes. In this process, she copied the entire website and its content on a local drive to view the complete profile of the site's directory structure, file structure, external links, images, web pages, and so on. This information helps jane map the website's directories and gain valuable information. What is the attack technique employed by Jane in the above scenario?

Options:

A.  

website mirroring

B.  

Session hijacking

C.  

Web cache poisoning

D.  

Website defacement

Discussion 0
Questions 64

A large mobile telephony and data network operator has a data center that houses network elements. These are essentially large computers running on Linux. The perimeter of the data center is secured with firewalls and IPS systems.

What is the best security policy concerning this setup?

Options:

A.  

Network elements must be hardened with user ids and strong passwords. Regular security tests and audits should be performed.

B.  

As long as the physical access to the network elements is restricted, there is no need for additional measures.

C.  

There is no need for specific security measures on the network elements as long as firewalls and IPS systems exist.

D.  

The operator knows that attacks and down time are inevitable and should have a backup site.

Discussion 0
Questions 65

A penetration tester is performing the footprinting process and is reviewing publicly available information about an organization by using the Google search engine.

Which of the following advanced operators would allow the pen tester to restrict the search to the organization’s web domain?

Options:

A.  

[allinurl:]

B.  

[location:]

C.  

[site:]

D.  

[link:]

Discussion 0
Questions 66

A "Server-Side Includes" attack refers to the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary code remotely.

Which web-page file type, if it exists on the web server, is a strong indication that the server is vulnerable to this kind of attack?

Options:

A.  

.stm

B.  

.html

C.  

.rss

D.  

.cms

Discussion 0
Questions 67

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?

Options:

A.  

Scanning

B.  

Footprinting

C.  

Enumeration

D.  

System Hacking

Discussion 0
Questions 68

Which method of password cracking takes the most time and effort?

Options:

A.  

Dictionary attack

B.  

Shoulder surfing

C.  

Rainbow tables

D.  

Brute force

Discussion 0
Questions 69

Which of the following is the BEST way to defend against network sniffing?

Options:

A.  

Using encryption protocols to secure network communications

B.  

Register all machines MAC Address in a Centralized Database

C.  

Use Static IP Address

D.  

Restrict Physical Access to Server Rooms hosting Critical Servers

Discussion 0
Questions 70

George is a security professional working for iTech Solutions. He was tasked with securely transferring sensitive data of the organization between industrial systems. In this process, he used a short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m. What is the short-range wireless communication technology George employed in the above scenario?

Options:

A.  

MQTT

B.  

LPWAN

C.  

Zigbee

D.  

NB-IoT

Discussion 0
Questions 71

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?

Options:

A.  

Application

B.  

Transport

C.  

Session

D.  

Presentation

Discussion 0
Questions 72

Study the following log extract and identify the attack.

Options:

A.  

Hexcode Attack

B.  

Cross Site Scripting

C.  

Multiple Domain Traversal Attack

D.  

Unicode Directory Traversal Attack

Discussion 0
Questions 73

Which of the following statements is TRUE?

Options:

A.  

Packet Sniffers operate on the Layer 1 of the OSI model.

B.  

Packet Sniffers operate on Layer 2 of the OSI model.

C.  

Packet Sniffers operate on both Layer 2 & Layer 3 of the OSI model.

D.  

Packet Sniffers operate on Layer 3 of the OSI model.

Discussion 0
Questions 74

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

Options:

A.  

hping2 host.domain.com

B.  

hping2 --set-ICMP host.domain.com

C.  

hping2 -i host.domain.com

D.  

hping2 -1 host.domain.com

Discussion 0
Questions 75

ping-* 6 192.168.0.101

Output:

Pinging 192.168.0.101 with 32 bytes of data:

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101: bytes=32 time<1ms TTL=128

Reply from 192.168.0.101:

Ping statistics for 192.168.0101

Packets: Sent = 6, Received = 6, Lost = 0 (0% loss).

Approximate round trip times in milli-seconds:

Minimum = 0ms, Maximum = 0ms, Average = 0ms

What does the option * indicate?

Options:

A.  

t

B.  

s

C.  

a

D.  

n

Discussion 0
Questions 76

What is one of the advantages of using both symmetric and asymmetric cryptography in SSL/TLS?

Options:

A.  

Supporting both types of algorithms allows less-powerful devices such as mobile phones to use symmetric encryption instead.

B.  

Symmetric algorithms such as AES provide a failsafe when asymmetric methods fail.

C.  

Symmetric encryption allows the server to security transmit the session keys out-of-band.

D.  

Asymmetric cryptography is computationally expensive in comparison. However, it is well-suited to securely negotiate keys for use with symmetric cryptography.

Discussion 0
Questions 77

If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?

Options:

A.  

–r

B.  

–F

C.  

–P

D.  

–sP

Discussion 0
Questions 78

You are a penetration tester working to test the user awareness of the employees of the client xyz. You harvested two employees' emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?

Options:

A.  

Reconnaissance

B.  

Command and control

C.  

Weaponization

D.  

Exploitation

Discussion 0
Questions 79

Bob, a network administrator at BigUniversity, realized that some students are connecting their notebooks in the wired network to have Internet access. In the university campus, there are many Ethernet ports available for professors and authorized visitors but not for students.

He identified this when the IDS alerted for malware activities in the network. What should Bob do to avoid this problem?

Options:

A.  

Disable unused ports in the switches

B.  

Separate students in a different VLAN

C.  

Use the 802.1x protocol

D.  

Ask students to use the wireless network

Discussion 0