Certified Ethical Hacker – CEH – 312-50 – Question471

Which of the following BEST describes the mechanism of a Boot Sector Virus?


A.
Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
B. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
C. Overwrites the original MBR and only executes the new virus code
D. Modifies directory table entries so that directory entries point to the virus code instead of the actual program

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question469

In order to prevent particular ports and applications from getting packets into an organization, what does a firewall check?


A.
Network layer headers and the session layer port numbers
B. Presentation layer headers and the session layer port numbers
C. Application layer port numbers and the transport layer headers
D. Transport layer port numbers and application layer headers

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question468

While you were gathering information as part of security assessments for one of your clients, you were able to gather data that show your client is involved with fraudulent activities. What should you do?


A.
Immediately stop work and contact the proper legal authorities
B. Ignore the data and continue the assessment until completed as agreed
C. Confront the client in a respectful manner and ask her about the data
D. Copy the data to removable media and keep it in case you need it

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question465

Youve just discovered a server that is currently active within the same network with the machine you recently compromised. You ping it but it did not respond. What could be the case?


A.
TCP/IP doesnt support ICMP
B. ARP is disabled on the target server
C. ICMP could be disabled on the target server
D. You need to run the ping command with root privileges

Correct Answer: C