Certified Ethical Hacker 312-50v10 – Question221

It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection. Which of the following terms best matches the definition?


A.
Bluetooth
B. WLAN
C. InfraRed
D. Radio-Frequency identification

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question219

A well-intentioned researcher discovers a vulnerability on the web site of a major corporation. What should he do?


A.
Try to sell the information to a well-paying party on the dark web.
B. Exploit the vulnerability without harming the web site owner so that attention be drawn to the problem.
C. Ignore it.
D. Notify the web site owner so that corrective action be taken as soon as possible to patch the vulnerability.

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question218

Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides security through obscurity.

What technique is Ricardo using?


A.
Encryption
B. Steganography
C. RSA algorithm
D. Public-key cryptography

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question216

What is the correct process for the TCP three-way handshake connection establishment and connection termination?


A.
Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: FIN, ACK-FIN, ACK
B. Connection Establishment: ACK, ACK-SYN, SYN Connection Termination: FIN, ACK-FIN, ACK
C. Connection Establishment: FIN, ACK-FIN, ACK Connection Termination: SYN, SYN-ACK, ACK
D. Connection Establishment: SYN, SYN-ACK, ACK Connection Termination: ACK, ACK-SYN, SYN

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question215

Eve stole a file named secret.txt, transferred it to her computer and she just entered these commands:

What is she trying to achieve?


A.
She is using ftp to transfer the file to another hacker named John.
B. She is using John the Ripper to crack the passwords in the secret.txt file
C. She is encrypting the file.
D. She is using John the Ripper to view the contents of the file.

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question214

The Heartbleed bug was discovered in 2014 and is widely referred to under MITREs Common Vulnerabilities and Exposures (CVE) as CVE-2014-0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.

What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?


A.
Public
B. Private
C. Shared
D. Root

Correct Answer: B