312-50 : CEH Certified Ethical Hacker (312-50v9) : Part 09
-
A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?
- Perform a dictionary attack.
- Perform a brute force attack.
- Perform an attack with a rainbow table.
- Perform a hybrid attack.
-
Which of the following does proper basic configuration of snort as a network intrusion detection system require?
- Limit the packets captured to the snort configuration file.
- Capture every packet on the network segment.
- Limit the packets captured to a single segment.
- Limit the packets captured to the /var/log/snort directory.
-
How is sniffing broadly categorized?
- Active and passive
- Broadcast and unicast
- Unmanaged and managed
- Filtered and unfiltered
-
What are the three types of authentication?
- Something you: know, remember, prove
- Something you: have, know, are
- Something you: show, prove, are
- Something you: show, have, prove
-
The use of technologies like IPSec can help guarantee the following: authenticity, integrity, confidentiality and
- non-repudiation.
- operability.
- security.
- usability.
-
What is the main disadvantage of the scripting languages as opposed to compiled programming languages?
- Scripting languages are hard to learn.
- Scripting languages are not object-oriented.
- Scripting languages cannot be used to create graphical user interfaces.
- Scripting languages are slower because they require an interpreter to run the code.
-
A botnet can be managed through which of the following?
- IRC
- Linkedin and Facebook
- A vulnerable FTP server
-
Fingerprinting VPN firewalls is possible with which of the following tools?
- Angry IP
- Nikto
- Ike-scan
- Arp-scan
-
What is a successful method for protecting a router from potential smurf attacks?
- Placing the router in broadcast mode
- Enabling port forwarding on the router
- Installing the router outside of the network’s firewall
- Disabling the router from accepting broadcast ping messages
-
Which of the following is optimized for confidential communications, such as bidirectional voice and video?
- RC4
- RC5
- MD4
- MD5
-
Advanced encryption standard is an algorithm used for which of the following?
- Data integrity
- Key discovery
- Bulk data encryption
- Key recovery
-
The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?
- Multiple keys for non-repudiation of bulk data
- Different keys on both ends of the transport medium
- Bulk encryption for data transmission over fiber
- The same key on each end of the transmission medium
-
An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?
- Birthday attack
- Plaintext attack
- Meet in the middle attack
- Chosen ciphertext attack
-
What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?
- Due to the key size, the time it will take to encrypt and decrypt the message hinders efficient communication.
- To get messaging programs to function with this algorithm requires complex configurations.
- It has been proven to be a weak cipher; therefore, should not be trusted to protect sensitive data.
- It is a symmetric key algorithm, meaning each recipient must receive the key through a different channel than the message.
-
A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?
- Public key
- Private key
- Modulus length
- Email server certificate
-
When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?
- The key entered is a symmetric key used to encrypt the wireless data.
- The key entered is a hash that is used to prove the integrity of the wireless data.
- The key entered is based on the Diffie-Hellman method.
- The key is an RSA key used to encrypt the wireless data.
-
An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?
- Timing attack
- Replay attack
- Memory trade-off attack
- Chosen plain-text attack
-
Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?
- Certificate issuance
- Certificate validation
- Certificate cryptography
- Certificate revocation
-
Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?
- Key registry
- Recovery agent
- Directory
- Key escrow
-
To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?
- Harvesting
- Windowing
- Hardening
- Stealthing
Subscribe
0 Comments
Newest