Certified Ethical Hacker 312-50v10 – Question312

An Intrusion Detection System (IDS) has alerted the network administrator to a possibly malicious sequence of packets sent to a Web server in the networks external DMZ. The packet traffic was captured by the IDS and saved to a PCAP file. What type of network tool can be used to determine if these packets are genuinely malicious or simply a false positive?


A.
Protocol analyzer
B. Network sniffer
C. Intrusion Prevention System (IPS)
D. Vulnerability scanner

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question311

Which of the following steps for risk assessment methodology refers to vulnerability identification?


A.
Assigns values to risk probabilities; Impact values
B. Determines risk probability that vulnerability will be exploited (High, Medium, Low)
C. Identifies sources of harm to an IT system (Natural, Human, Environmental)
D. Determines if any flaws exist in systems, policies, or procedures

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question310

User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?


A.
Application
B. Transport
C. Session
D. Presentation

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question307

Suppose your company has just passed a security risk assessment exercise. The results display that the risk of the breach in the main company application is 50%. Security staff has taken some measures and implemented the necessary controls. After that, another security risk assessment was performed showing that risk has decreased to 10%. The risk threshold for the application is 20%. Which of the following risk decisions will be the best for the project in terms of its successful continuation with the most business profit?


A.
Accept the risk
B. Introduce more controls to bring risk to 0%
C. Mitigate the risk
D. Avoid the risk

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question306

When you are getting information about a web server, it is very important to know the HTTP Methods (GET, POST, HEAD, PUT, DELETE, TRACE) that are available because there are two critical methods (PUT and DELETE). PUT can upload a file to the server and DELETE can delete a file from the server. You can detect all these methods (GET, POST, HEAD, DELETE, PUT, TRACE) using NMAP script engine. What Nmap script will help you with this task?


A.
http-methods
B. http enum
C. http-headers
D. http-git

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question305

Your business has decided to add credit card numbers to the data it backs up to tape. Which of the following represents the best practice your business should observe?


A.
Do not back up either the credit card numbers or their hashes.
B. Encrypt backup tapes that are sent off-site.
C. Back up the hashes of the credit card numbers not the actual credit card numbers.
D. Hire a security consultant to provide direction.

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question304

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?


A.
Exploration
B. Investigation
C. Reconnaissance
D. Enumeration

Correct Answer: C

Certified Ethical Hacker 312-50v10 – Question303

Email is transmitted across the Internet using the Simple Mail Transport Protocol. SMTP does not encrypt email, leaving the information in the message vulnerable to being read by an unauthorized person. SMTP can upgrade a connection between two mail servers to use TLS. Email transmitted by SMTP over TLS is encrypted. What is the name of the command used by SMTP to transmit email over TLS?


A.
OPPORTUNISTICTLS
B. UPGRADETLS
C. FORCETLS
D. STARTTLS

Correct Answer: D