Certified Ethical Hacker – CEH – 312-50 – Question502

A recent security audit revealed that there were indeed several occasions that the companys network was breached. After investigating, you discover that your IDS is not configured properly and therefore is unable to trigger alarms when needed. What type of alert is the IDS giving?


A.
True Positive
B. False Negative
C. False Positive
D. False Positive

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question500

Supposed you are the Chief Network Engineer of a certain Telco. Your company is planning for a big business expansion and it requires that your network authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol would you implement?


A.
TACACS+
B. DIAMETER
C. Kerberos
D. RADIUS

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question499

A hacker was able to easily gain access to a website. He was able to log in via the frontend user login form of the website using default or commonly used credentials. This exploitation is an example of what Software design flaw?


A.
Insufficient security management
B. Insufficient database hardening
C. Insufficient input validation
D. Insufficient exception handling

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question498

While performing online banking using a Web browser, Kyle receives an email that contains an image of a well-crafted art. Upon clicking the image, a new tab on the web browser opens and shows an animated GIF of bills and coins being swallowed by a crocodile. After several days, Kyle noticed that all his funds on the bank was gone. What Web browser-based security vulnerability got exploited by the hacker?


A.
Clickjacking
B. Web Form Input Validation
C. Cross-Site Request Forgery
D. Cross-Site Scripting

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question497

Jack was attempting to fingerprint all machines in the network using the following Nmap syntax:
invictus@victim_server:~$ nmap -T4 -0 10.10.0.0/24
TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING!
Obviously, it is not going through. What is the issue here?


A.
OS Scan requires root privileges
B. The nmap syntax is wrong.
C. The outgoing TCP/IP fingerprinting is blocked by the host firewall
D. This is a common behavior for a corrupted nmap application

Correct Answer: A