312-50v7 Ethical Hacking & Countermeasures V7 Practice Test Set 2

Which of the following is an example of an asymmetric encryption implementation?


Options are :

  • PGP (Correct)
  • 3DES
  • MD5
  • SHA1

Answer : PGP

ECCouncil ECSS Certified Security Specialist Practice Exam Set 10

Which of the statements concerning proxy firewalls is correct?


Options are :

  • Proxy firewalls increase the speed and functionality of a network.
  • Firewall proxy servers decentralize all activity for an application.
  • Proxy firewalls block network packets from passing to and from a protected network.
  • Computers establish a connection with a proxy firewall which initiates a new network connection for the client (Correct)

Answer : Computers establish a connection with a proxy firewall which initiates a new network connection for the client

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?


Options are :

  • The host is likely a Linux machine.
  • The host is likely a printer. (Correct)
  • The host is likely a router.
  • The host is likely a Windows machine.

Answer : The host is likely a printer.

The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?


Options are :

  • Multiple keys for non-repudiation of bulk data
  • Bulk encryption for data transmission over fiber
  • The same key on each end of the transmission medium (Correct)
  • Different keys on both ends of the transport medium

Answer : The same key on each end of the transmission medium

ECCouncil EC1-349 Computer Hack Forensic Investigator Exam Set 5

For messages sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. While using a digital signature, the message digest is encrypted with which key?


Options are :

  • Sender's public key
  • Receiver's public key
  • Sender's private key (Correct)
  • Receiver's private key

Answer : Sender's private key

Which tool can be used to silently copy files from USB devices?


Options are :

  • USB Sniffer
  • USB Dumper (Correct)
  • USB Grabber
  • USB Snoopy

Answer : USB Dumper

A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the bank's DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the bank's job postings (paying special attention to IT related jobs), and visiting the local dumpster for the bank's corporate office. What phase of the penetration test is the tester currently in?


Options are :

  • Information reporting
  • Passive information gathering (Correct)
  • Vulnerability assessment
  • Active information gathering

Answer : Passive information gathering

ECCouncil EC0-349 Computer Hack Forensic Investigator Exam Set 5

How can telnet be used to fingerprint a web server?


Options are :

  • telnet webserverAddress 80 HEAD / HTTP/1.0 (Correct)
  • telnet webserverAddress 80 PUT / HTTP/1.0
  • telnet webserverAddress 80 HEAD / HTTP/2.0
  • telnet webserverAddress 8 PUT / HTTP/2.0

Answer : telnet webserverAddress 80 HEAD / HTTP/1.0

Which NMAP feature can a tester implement or adjust while scanning for open ports to avoid detection by the network’s IDS?


Options are :

  • Timing options to slow the speed that the port scan is conducted (Correct)
  • ICMP ping sweep to determine which hosts on the network are not available
  • Fingerprinting to identify which operating systems are running on the network
  • Traceroute to control the path of the packets sent during the scan

Answer : Timing options to slow the speed that the port scan is conducted

The intrusion detection system at a software development company suddenly generates multiple alerts regarding attacks against the company's external webserver, VPN concentrator, and DNS servers. What should the security team do to determine which alerts to check first?


Options are :

  • Investigate based on the potential effect of the incident. (Correct)
  • Investigate based on the maintenance schedule of the affected systems.
  • Investigate based on the order that the alerts arrived in.
  • Investigate based on the service level agreements of the systems.

Answer : Investigate based on the potential effect of the incident.

ECCouncil EC0-479 Certified Security Analyst (ECSA) Exam Set 4

Which of the following tools will scan a network to perform vulnerability checks and compliance auditing?


Options are :

  • NMAP
  • BeEF
  • Metasploit
  • Nessus (Correct)

Answer : Nessus

Which method can provide a better return on IT security investment and provide a thorough and comprehensive assessment of organizational security covering policy, procedure design, and implementation?


Options are :

  • Penetration testing (Correct)
  • Access control list reviews
  • Vulnerability scanning
  • Social engineering

Answer : Penetration testing

What is the purpose of conducting security assessments on network resources?


Options are :

  • Implementation
  • Management
  • Validation (Correct)
  • Documentation

Answer : Validation

ECCouncil 312-49 Computer Hacking Forensic Investigator Exam Set 7

A computer technician is using a new version of a word processing software package when it is discovered that a special sequence of characters causes the entire computer to crash. The technician researches the bug and discovers that no one else experienced the problem. What is the appropriate next step?


Options are :

  • Ignore the problem completely and let someone else deal with it.
  • Create a document that will crash the computer when opened and send it to friends.
  • Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix. (Correct)
  • Find an underground bulletin board and attempt to sell the bug to the highest bidder.

Answer : Notify the vendor of the bug and do not disclose it until the vendor gets a chance to issue a fix.

Which initial procedure should an ethical hacker perform after being brought into an organization?


Options are :

  • Turn over deliverables.
  • Assess what the organization is trying to protect.
  • Begin security testing.
  • Sign a formal contract with non-disclosure. (Correct)

Answer : Sign a formal contract with non-disclosure.

Which of the following is an application that requires a host application for replication?


Options are :

  • Trojan
  • Worm
  • Virus (Correct)
  • Micro

Answer : Virus

EC1-349 ECCouncil Computer Hacking Forensic Investigator Set 6

How is sniffing broadly categorized?


Options are :

  • Active and passive (Correct)
  • Broadcast and unicast
  • Unmanaged and managed
  • Filtered and unfiltered

Answer : Active and passive

How does an operating system protect the passwords used for account logins?


Options are :

  • The operating system performs a one-way hash of the passwords. (Correct)
  • The operating system stores all passwords in a protected segment of non-volatile memory.
  • The operating system stores the passwords in a secret file that users cannot find.
  • The operating system encrypts the passwords, and decrypts them when needed.

Answer : The operating system performs a one-way hash of the passwords.

An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?


Options are :

  • g++ -i hackersExploit.pl -o calc.exe
  • g++ hackersExploit.py -o calc.exe
  • g++ --compile –i hackersExploit.cpp -o calc.exe
  • g++ hackersExploit.cpp -o calc.exe (Correct)

Answer : g++ hackersExploit.cpp -o calc.exe

ECCouncil EC0-479 Certified Security Analyst (ECSA) Exam Set 7

Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?


Options are :

  • SQL injection
  • CRLF injection
  • Cross-site scripting
  • Missing patches (Correct)

Answer : Missing patches

A consultant has been hired by the V.P. of a large financial organization to assess the company's security posture. During the security testing, the consultant comes across child pornography on the V.P.'s computer. What is the consultant's obligation to the financial organization?


Options are :

  • Stop work immediately and contact the authorities. (Correct)
  • Say nothing and continue with the security testing.
  • Delete the pornography, say nothing, and continue security testing.
  • Bring the discovery to the financial organization's human resource department.

Answer : Stop work immediately and contact the authorities.

EC0-479 EC-Council Certified Security Analyst Practice Exam Set 6

An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?


Options are :

  • Timing attack
  • Replay attack
  • Memory trade-off attack
  • Chosen plain-text attack (Correct)

Answer : Chosen plain-text attack

A penetration tester was hired to perform a penetration test for a bank. The tester began searching for IP ranges owned by the bank, performing lookups on the bank's DNS servers, reading news articles online about the bank, watching what times the bank employees come into work and leave from work, searching the bank's job postings (paying special attention to IT related jobs), and visiting the local dumpster for the bank's corporate office. What phase of the penetration test is the tester currently in?


Options are :

  • Vulnerability assessment
  • Information reporting
  • Active information gathering
  • Passive information gathering (Correct)

Answer : Passive information gathering

The use of technologies like IPSec can help guarantee the followinG. authenticity, integrity, confidentiality and


Options are :

  • usability.
  • operability.
  • security.
  • non-repudiation. (Correct)

Answer : non-repudiation.

ECCouncil 312-49 Computer Hacking Forensic Investigator Exam Set 4

What statement is true regarding LM hashes?


Options are :

  • LM hashes are based on AES128 cryptographic standard.
  • LM hashes consist in 48 hexadecimal characters.
  • Uppercase characters in the password are converted to lowercase.
  • LM hashes are not generated when the password length exceeds 15 characters. (Correct)

Answer : LM hashes are not generated when the password length exceeds 15 characters.

Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?


Options are :

  • Cross-site scripting
  • SQL injection
  • Missing patches (Correct)
  • CRLF injection

Answer : Missing patches

Which types of detection methods are employed by Network Intrusion Detection Systems (NIDS)? (Choose two.)


Options are :

  • Anomaly (Correct)
  • Reactive
  • Passive
  • Signature (Correct)

Answer : Anomaly Signature

712-50 EC-Council Certified CISO Certification Practice Exam Set 12

Which of the following is an example of two factor authentication?


Options are :

  • PIN Number and Birth Date
  • Digital Certificate and Hardware Token
  • Username and Password
  • Fingerprint and Smartcard ID (Correct)

Answer : Fingerprint and Smartcard ID

Which type of access control is used on a router or firewall to limit network activity?


Options are :

  • Mandatory
  • Discretionary
  • Rule-based (Correct)
  • Role-based

Answer : Rule-based

What is the purpose of conducting security assessments on network resources?


Options are :

  • Management
  • Implementation
  • Documentation
  • Validation (Correct)

Answer : Validation

ECCouncil 412-79v8 Certified Security Analyst (ECSA) Exam Set 6

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions