Certified Ethical Hacker 312-50v10 – Question082

A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?


A.
The file reveals the passwords to the root user only.
B. The password file does not contain the passwords themselves.
C. He cannot read it because it is encrypted.
D. He can open it and read the user ids and corresponding passwords.

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question079

Which of the following provides a security professional with most information about the systems security posture?


A.
Wardriving, warchalking, social engineering
B. Social engineering, company site browsing, tailgating
C. Phishing, spamming, sending trojans
D. Port scanning, banner grabbing, service identification

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question076

Some clients of TPNQM SA were redirected to a malicious site when they tried to access the TPNQM main site. Bob, a system administrator at TPNQM SA, found that they were victims of DNS Cache Poisoning.
What should Bob recommend to deal with such a threat?


A.
The use of security agents in clients computers
B. The use of DNSSEC
C. The use of double-factor authentication
D. Client awareness

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question074

You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8.

While monitoring the data, you find a high number of outbound connections. You see that IPs owned by XYZ (Internal) and private IPs are communicating to a Single Public IP.
Therefore, the Internal IPs are sending data to the Public IP.

After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices are compromised.

What kind of attack does the above scenario depict?


A.
Botnet Attack
B. Spear Phishing Attack
C. Advanced Persistent Threats
D. Rootkit Attack

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question073

DNS cache snooping is a process of determining if the specified resource address is present in the DNS cache records. It may be useful during the examination of the network to determine what software update resources are used, thus discovering what software is installed.
What command is used to determine if the entry is present in DNS cache?


A.
nslookup -fullrecursive update.antivirus.com
B. dnsnooping rt update.antivirus.com
C. nslookup -norecursive update.antivirus.com
D. dns –snoop update.antivirus.com

Correct Answer: C