Certified Ethical Hacker 312-50v10 – Question302

DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent manin-the-middle attacks?


A.
Spanning tree
B. Dynamic ARP Inspection (DAI)
C. Port security
D. Layer 2 Attack Prevention Protocol (LAPP)

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question301

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple, smallsized packets to the target computer, making it very difficult for an IDS to detect the attack signatures. Which tool can be used to perform session splicing attacks?


A.
tcpsplice
B. Burp
C. Hydra
D. Whisker

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question298

What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?


A.
Man-in-the-middle attack
B. Meet-in-the-middle attack
C. Replay attack
D. Traffic analysis attack

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question297

A companys policy requires employees to perform file transfers using protocols which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes. You have positioned a network sniffer to capture traffic from the laptops used by employees in the data ingest department.
Using Wireshark to examine the captured traffic, which command can be used as display filter to find unencrypted file transfers?


A.
tcpport ==21
B. tcp. port = 23
C. tcp.port = = 21 | | tcp.port = =22
D. tcp.port ! = 21

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question296

Jims company regularly performs backups of their critical servers. But the company cannot afford to send backup tapes to an off-site vendor for long-term storage and archiving.
Instead, Jims company keeps the backup tapes in a safe in the office. Jims company is audited each year, and the results from this years audit show a risk because backup tapes are not stored off-site. The Manager of Information Technology has a plan to take the backup tapes home with him and wants to know what two things he can do to secure the backup tapes while in transit?


A.
Encrypt the backup tapes and transport them in a lock box.
B. Degauss the backup tapes and transport them in a lock box.
C. Hash the backup tapes and transport them in a lock box.
D. Encrypt the backup tapes and use a courier to transport them.

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question294

You are monitoring the network of your organizations. You notice that:

1. There are huge outbound connections from your Internal Network to External IPs
2. On further investigation, you see that the external IPs are blacklisted
3. Some connections are accepted, and some are dropped
4. You find that it is a CnC communication
Which of the following solution will you suggest?


A.
Block the Blacklist IPs @ Firewall
B. Update the Latest Signatures on your IDS/IPS
C. Clean the Malware which are trying to Communicate with the External Blacklist IPs
D. Block the Blacklist IPs @ Firewall as well as Clean the Malware which are trying to Communicate with the External Blacklist IPs.

Correct Answer: D