Certified Ethical Hacker – CEH – 312-50 – Question104

A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol
that the network administrator should recommend?


A.
IP Security (IPSEC)
B. Multipurpose Internet Mail Extensions (MIME)
C. Pretty Good Privacy (PGP)
D. Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question103

A security engineer has been asked to deploy a secure remote access solution that will allow employees to connect to the companys internal network. Which of the following can be implemented to minimize the opportunity for the man-in-the-middle attack to occur?


A.
SSL
B. Mutual authentication
C. IPSec
D. Static IP addresses

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question099

From the two screenshots below, which of the following is occurring?


A.
10.0.0.253 is performing an IP scan against 10.0.0.0/24, 10.0.0.252 is performing a port scan against 10.0.0.2.
B. 10.0.0.253 is performing an IP scan against 10.0.0.2, 10.0.0.252 is performing a port scan against 10.0.0.2.
C. 10.0.0.2 is performing an IP scan against 10.0.0.0/24, 10.0.0.252 is performing a port scan against 10.0.0.2.
D. 10.0.0.252 is performing an IP scan against 10.0.0.2, 10.0.0.252 is performing a port scan against 10.0.0.2.

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question098

An organization hires a tester to do a wireless penetration test. Previous reports indicate that the last test did not contain management or control packets in the submitted traces. Which of the following is the most likely reason for lack of management or control packets?


A.
The wireless card was not turned on.
B. The wrong network card drivers were in use by Wireshark.
C. On Linux and Mac OS X, only 802.11 headers are received in promiscuous mode.
D. Certain operating systems and adapters do not collect the management or control packets.

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question096

When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following?


A.
Drops the packet and moves on to the next one
B. Continues to evaluate the packet until all rules are checked
C. Stops checking rules, sends an alert, and lets the packet continue
D. Blocks the connection with the source IP address in the packet

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question095

The network administrator for a company is setting up a website with e-commerce capabilities. Packet sniffing is a concern because credit card information will be sent electronically over the Internet. Customers visiting the site will need to encrypt the data with HTTPS. Which type of certificate is used to encrypt and decrypt the data?


A.
Asymmetric
B. Confidential
C. Symmetric
D. Non-confidential

Correct Answer: A