Certified Ethical Hacker 312-50v10 – Question042

This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.

Which of the following tools is being described?


A.
wificracker
B. Airguard
C. WLAN-crack
D. Aircrack-ng

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question040

The "white box testing" methodology enforces what kind of restriction?


A.
Only the internal operation of a system is known to the tester.
B. The internal operation of a system is completely known to the tester.
C. The internal operation of a system is only partly accessible to the tester.
D. Only the external operation of a system is accessible to the tester.

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question039

What is not a PCI compliance recommendation?


A.
Use a firewall between the public network and the payment card data.
B. Use encryption to protect all transmission of card holder data over any public network.
C. Rotate employees handling credit card transactions on a yearly basis to different departments.
D. Limit access to card holder data to as few individuals as possible.

Correct Answer: C

Certified Ethical Hacker 312-50v10 – Question037

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?


A.
Traceroute
B. Hping
C. TCP ping
D. Broadcast ping

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question036

When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?


A.
At least twice a year or after any significant upgrade or modification
B. At least once a year and after any significant upgrade or modification
C. At least once every two years and after any significant upgrade or modification
D. At least once every three years or after any significant upgrade or modification

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question033

Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library? This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.


A.
SSL/TLS Renegotiation Vulnerability
B. Shellshock
C. Heartbleed Bug
D. POODLE

Correct Answer: C