Last Updated on July 24, 2021 by InfraExam

EC0-350 : ECCouncil Certified Ethical Hacker v8 : Part 09

  1. A company is using Windows Server 2003 for its Active Directory (AD). What is the most efficient way to crack the passwords for the AD users?

    • Perform a dictionary attack.
    • Perform a brute force attack.
    • Perform an attack with a rainbow table.
    • Perform a hybrid attack.
  2. Which of the following does proper basic configuration of snort as a network intrusion detection system require?

    • Limit the packets captured to the snort configuration file.
    • Capture every packet on the network segment.
    • Limit the packets captured to a single segment.
    • Limit the packets captured to the /var/log/snort directory.
  3. How is sniffing broadly categorized?

    • Active and passive
    • Broadcast and unicast
    • Unmanaged and managed
    • Filtered and unfiltered
  4. What are the three types of authentication?

    • Something you: know, remember, prove
    • Something you: have, know, are
    • Something you: show, prove, are
    • Something you: show, have, prove
  5. The use of technologies like IPSec can help guarantee the following: authenticity, integrity, confidentiality and

    • non-repudiation.
    • operability.
    • security.
    • usability.
  6. What is the main disadvantage of the scripting languages as opposed to compiled programming languages?

    • Scripting languages are hard to learn.
    • Scripting languages are not object-oriented.
    • Scripting languages cannot be used to create graphical user interfaces.
    • Scripting languages are slower because they require an interpreter to run the code.
  7. A botnet can be managed through which of the following?

    • IRC
    • E-Mail
    • Linkedin and Facebook
    • A vulnerable FTP server
  8. Fingerprinting VPN firewalls is possible with which of the following tools?

    • Angry IP
    • Nikto
    • Ike-scan
    • Arp-scan
  9. What is a successful method for protecting a router from potential smurf attacks?

    • Placing the router in broadcast mode
    • Enabling port forwarding on the router
    • Installing the router outside of the network’s firewall
    • Disabling the router from accepting broadcast ping messages
  10. Which of the following is optimized for confidential communications, such as bidirectional voice and video?

    • RC4
    • RC5
    • MD4
    • MD5
  11. Advanced encryption standard is an algorithm used for which of the following?

    • Data integrity
    • Key discovery
    • Bulk data encryption
    • Key recovery
  12. The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?

    • Multiple keys for non-repudiation of bulk data
    • Different keys on both ends of the transport medium
    • Bulk encryption for data transmission over fiber
    • The same key on each end of the transmission medium
  13. An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?

    • Birthday attack
    • Plaintext attack
    • Meet in the middle attack
    • Chosen ciphertext attack
  14. What is the primary drawback to using advanced encryption standard (AES) algorithm with a 256 bit key to share sensitive data?

    • Due to the key size, the time it will take to encrypt and decrypt the message hinders efficient communication.
    • To get messaging programs to function with this algorithm requires complex configurations.
    • It has been proven to be a weak cipher; therefore, should not be trusted to protect sensitive data.
    • It is a symmetric key algorithm, meaning each recipient must receive the key through a different channel than the message.
  15. A Certificate Authority (CA) generates a key pair that will be used for encryption and decryption of email. The integrity of the encrypted email is dependent on the security of which of the following?

    • Public key
    • Private key
    • Modulus length
    • Email server certificate
  16. When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?

    • The key entered is a symmetric key used to encrypt the wireless data.
    • The key entered is a hash that is used to prove the integrity of the wireless data.
    • The key entered is based on the Diffie-Hellman method.
    • The key is an RSA key used to encrypt the wireless data.
  17. An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?

    • Timing attack
    • Replay attack
    • Memory trade-off attack
    • Chosen plain-text attack
  18. Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?

    • Certificate issuance
    • Certificate validation
    • Certificate cryptography
    • Certificate revocation
  19. Which of the following describes a component of Public Key Infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

    • Key registry
    • Recovery agent
    • Directory
    • Key escrow
  20. To reduce the attack surface of a system, administrators should perform which of the following processes to remove unnecessary software, services, and insecure configuration settings?

    • Harvesting
    • Windowing
    • Hardening
    • Stealthing