Certified Ethical Hacker – CEH – 312-50 – Question364

The company ABC recently contracted a new accountant. The accountant will be working with the financial statements. Those financial statements need to be approved by the CFO and then they will be sent to the accountant but the CFO is worried because he wants to be sure that the information sent to the accountant was not modified once he approved it. What of the following options can be useful to ensure the integrity of the data?


A.
The document can be sent to the accountant using an exclusive USB for that document.
B. The CFO can use a hash algorithm in the document once he approved the financial statements.
C. The financial statements can be sent twice, one by email and the other delivered in USB and the accountant can compare both to be sure it is the same document.
D. The CFO can use an excel file with a password.

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question363

The company ABC recently discovered that their new product was released by the opposition before their premiere. They contract an investigator who discovered that the maid threw away papers with confidential information about the new product and the opposition found it in the garbage. What is the name of the technique used by the opposition?


A.
Hack attack
B. Sniffing
C. Dumpster diving
D. Spying

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question362

What is the role of test automation in security testing?


A.
It can accelerate benchmark tests and repeat them with a consistent test setup. But it cannot replace manual testing completely.
B. It is an option but it tends to be very expensive.
C. It should be used exclusively. Manual testing is outdated because of low speed and possible test setup inconsistencies.
D. Test automation is not usable in security due to the complexity of the tests.

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question360

An attacker is trying to redirect the traffic of a small office. That office is using their own mail server, DNS server and NTP server because of the importance of their job. The attacker gains access to the DNS server and redirects the direction www.google.com to his own IP address. Now when the employees of the office want to go to Google they are being redirected to the attacker machine. What is the name of this kind of attack?


A.
ARP Poisoning
B. Smurf Attack
C. DNS spoofing
D. MAC Flooding

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question357

Which of the following statements regarding ethical hacking is incorrect?


A.
Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization's systems.
B. Testing should be remotely performed offsite.
C. An organization should use ethical hackers who do not sell vendor hardware/software or other consulting services.
D. Ethical hacking should not involve writing to or modifying the target systems.

Correct Answer: A

Explanation:

Ethical hackers use the same methods and techniques, including those that have the potential of exploiting vulnerabilities, to test and bypass a system’s defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found,
they document them and provide actionable advice on how to fix them so the organization can improve its overall security.

References: http://searchsecurity.techtarget.com/definition/ethical-hacker

Certified Ethical Hacker – CEH – 312-50 – Question356

During a security audit of IT processes, an IS auditor found that there were no documented security procedures. What should the IS auditor do?


A.
Identify and evaluate existing practices
B. Create a procedures document
C. Conduct compliance testing
D. Terminate the audit

Correct Answer: A

Explanation:

The auditor should first evaluated existing policies and practices to identify problem areas and opportunities.

Certified Ethical Hacker – CEH – 312-50 – Question355

Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'.

What technique is Ricardo using?


A.
Steganography
B. Public-key cryptography
C. RSA algorithm
D. Encryption

Correct Answer: A

Explanation:

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.

References: https://en.wikipedia.org/wiki/Steganography