Certified Ethical Hacker – CEH – 312-50 – Question034

A covert channel is a channel that


A.
transfers information over, within a computer system, or network that is outside of the security policy.
B. transfers information over, within a computer system, or network that is within the security policy.
C. transfers information via a communication path within a computer system, or network for transfer of data.
D. transfers information over, within a computer system, or network that is encrypted.

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question030

A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?


A.
Perform a vulnerability scan of the system.
B. Determine the impact of enabling the audit feature.
C. Perform a cost/benefit analysis of the audit feature.
D. Allocate funds for staffing of audit log review.

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question029

Which results will be returned with the following Google search query?
site:target.com -site:Marketing.target.com accounting


A.
Results matching all words in the query
B. Results matching accounting in domain target.com but not on the site Marketing.target.com
C. Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting
D. Results for matches on target.com and Marketing.target.com that include the word accounting

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question026

A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firm's public facing web servers. The engineer decides to start by using netcat to port 80.
The engineer receives this output:

Which of the following is an example of what the engineer performed?


A.
Cross-site scripting
B. Banner grabbing
C. SQL injection
D. Whois database query

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question025

The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:

What type of activity has been logged?


A.
Port scan targeting 192.168.1.103
B. Teardrop attack targeting 192.168.1.106
C. Denial of service attack targeting 192.168.1.103
D. Port scan targeting 192.168.1.106

Correct Answer: D