Last Updated on July 23, 2021 by InfraExam

312-50v10 : Certified Ethical Hacker v10 Exam : Part 05

  1. What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

    • Deferred risk
    • Impact risk
    • Inherent risk
    • Residual risk
  2. A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?

    • The file reveals the passwords to the root user only.
    • The password file does not contain the passwords themselves.
    • He cannot read it because it is encrypted.
    • He can open it and read the user ids and corresponding passwords.
  3. A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the Which of the following has occurred?

    • The computer is not using a private IP address.
    • The gateway is not routing to a public IP address.
    • The gateway and the computer are not on the same network.
    • The computer is using an invalid IP address.
  4. Chandler works as a pen-tester in an IT-firm in New York. As a part of detecting viruses in the systems, he uses a detection method where the anti-virus executes the malicious codes on a virtual machine to simulate CPU and memory activities.

    Which type of virus detection method did Chandler use in this context?

    • Heuristic Analysis
    • Code Emulation
    • Integrity checking
    • Scanning
  5. An attacker scans a host with the below command. Which three flags are set? (Choose three.)

    #nmap –sX

    • This is ACK scan. ACK flag is set
    • This is Xmas scan. SYN and ACK flags are set
    • This is Xmas scan. URG, PUSH and FIN are set
    • This is SYN scan. SYN flag is set
  6. Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal standpoint, what would be troublesome to take this kind of measure?

    • All of the employees would stop normal work activities
    • IT department would be telling employees who the boss is
    • Not informing the employees that they are going to be monitored could be an invasion of privacy.
    • The network could still experience traffic slow down.
  7. Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?

    • Internet Key Exchange (IKE)
    • Oakley
    • IPsec Policy Agent
    • IPsec driver
  8. An attacker, using a rogue wireless AP, performed an MITM attack and injected an HTML code to embed a malicious applet in all HTTP connections.

    When users accessed any page, the applet ran and exploited many machines.

    Which one of the following tools the hacker probably used to inject HTML code?

    • Wireshark
    • Ettercap
    • Aircrack-ng
    • Tcpdump
  9. You are monitoring the network of your organizations. You notice that:

    1. There are huge outbound connections from your Internal Network to External IPs
    2. On further investigation, you see that the external IPs are blacklisted
    3. Some connections are accepted, and some are dropped
    4. You find that it is a CnC communication

    Which of the following solution will you suggest?

    • Block the Blacklist IP’s @ Firewall
    • Update the Latest Signatures on your IDS/IPS
    • Clean the Malware which are trying to Communicate with the External Blacklist IP’s
    • Both B and C
  10. Security Policy is a definition of what it means to be secure for a system, organization or other entity. For Information Technologies, there are sub-policies like Computer Security Policy, Information Protection Policy, Information Security Policy, network Security Policy, Physical Security Policy, Remote Access Policy, and User Account Policy.

    What is the main theme of the sub-policies for Information Technologies?

    • Availability, Non-repudiation, Confidentiality
    • Authenticity, Integrity, Non-repudiation
    • Confidentiality, Integrity, Availability
    • Authenticity, Confidentiality, Integrity
  11. Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

    • Omnidirectional antenna
    • Dipole antenna
    • Yagi antenna
    • Parabolic grid antenna
  12. Why should the security analyst disable/remove unnecessary ISAPI filters?

    • To defend against social engineering attacks
    • To defend against webserver attacks
    • To defend against jailbreaking
    • To defend against wireless attacks
  13. Which of the following security policies defines the use of VPN for gaining access to an internal corporate network?

    • Network security policy
    • Information protection policy
    • Access control policy
    • Remote access policy
  14. To determine if a software program properly handles a wide range of invalid input, a form of automated testing can be used to randomly generate invalid input in an attempt to crash the program.

    What term is commonly used when referring to this type of testing?

    • Randomizing
    • Bounding
    • Mutating
    • Fuzzing
  15. If you want only to scan fewer ports than the default scan using Nmap tool, which option would you use?

    • -sP
    • -P
    • -r
    • -F
  16. In Risk Management, how is the term “likelihood” related to the concept of “threat?”

    • Likelihood is the likely source of a threat that could exploit a vulnerability.
    • Likelihood is the probability that a threat-source will exploit a vulnerability.
    • Likelihood is a possible threat-source that may exploit a vulnerability.
    • Likelihood is the probability that a vulnerability is a threat-source.
  17. Which of the following statements is TRUE?

    • Sniffers operate on Layer 2 of the OSI model
    • Sniffers operate on Layer 3 of the OSI model
    • Sniffers operate on both Layer 2 & Layer 3 of the OSI model.
    • Sniffers operate on the Layer 1 of the OSI model.
  18. What is the least important information when you analyze a public IP address in a security alert?

    • ARP
    • Whois
    • DNS
    • Geolocation
  19. You are the Network Admin, and you get a complaint that some of the websites are no longer accessible. You try to ping the servers and find them to be reachable. Then you type the IP address and then you try on the browser, and find it to be accessible. But they are not accessible when you try using the URL.

    What may be the problem?

    • Traffic is Blocked on UDP Port 53
    • Traffic is Blocked on TCP Port 80
    • Traffic is Blocked on TCP Port 54
    • Traffic is Blocked on UDP Port 80
  20. Internet Protocol Security IPSec is actually a suite of protocols. Each protocol within the suite provides different functionality. Collective IPSec does everything except.

    • Work at the Data Link Layer 
    • Protect the payload and the headers
    • Encrypt
    • Authenticate