Certified Ethical Hacker – CEH – 312-50 – Question014

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?


A.
The host is likely a Windows machine.
B. The host is likely a Linux machine.
C. The host is likely a router.
D. The host is likely a printer.

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question012

The following is a sample of output from a penetration tester's machine targeting a machine with the IP address of 192.168.1.106:

What is most likely taking place?


A.
Ping sweep of the 192.168.1.106 network
B. Remote service brute force attempt
C. Port scan of 192.168.1.106
D. Denial of service attack on 192.168.1.106

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question009

In order to show improvement of security over time, what must be developed?


A.
Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities

Correct Answer: C

Explanation:

Today, management demands metrics to get a clearer view of security.
Metrics that measure participation, effectiveness, and window of exposure, however, offer information the organization can use to make plans and improve programs.

References: http://www.infoworld.com/article/2974642/security/4-security-metrics-that-matter.html

Certified Ethical Hacker – CEH – 312-50 – Question008

Bluetooth uses which digital modulation technique to exchange information between paired devices?


A.
PSK (phase-shift keying)
B. FSK (frequency-shift keying)
C. ASK (amplitude-shift keying)
D. QAM (quadrature amplitude modulation)

Correct Answer: A

Explanation:

Phase shift keying is the form of Bluetooth modulation used to enable the higher data rates achievable with Bluetooth 2 EDR (Enhanced Data Rate). Two forms of PSK are used: p/4 DQPSK, and 8DPSK.

References: http://www.radio-electronics.com/info/wireless/bluetooth/radio-interface-modulation.php

Certified Ethical Hacker – CEH – 312-50 – Question007

Which of the following programs is usually targeted at Microsoft Office products?


A.
Polymorphic virus
B. Multipart virus
C. Macro virus
D. Stealth virus

Correct Answer: C

Explanation:

A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications). Some applications, such as Microsoft Office, allow macro programs to be embedded in documents such that the macros are run automatically when the document is opened, and this provides a distinct mechanism by which malicious computer instructions can spread.

References: https://en.wikipedia.org/wiki/Macro_virus

Certified Ethical Hacker – CEH – 312-50 – Question006

Which statement is TRUE regarding network firewalls preventing Web Application attacks?


A.
Network firewalls can prevent attacks because they can detect malicious HTTP traffic.
B. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened.
C. Network firewalls can prevent attacks if they are properly configured.
D. Network firewalls cannot prevent attacks because they are too complex to configure.

Correct Answer: B

Explanation:

Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set. To prevent Web Application attacks an Application layer firewall would be required.

References: https://en.wikipedia.org/wiki/Firewall_(computing)#Network_layer_or_packet_filters

Certified Ethical Hacker – CEH – 312-50 – Question005

Which of the following describes the characteristics of a Boot Sector Virus?


A.
Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
D. Overwrites the original MBR and only executes the new virus code

Correct Answer: B

Explanation:

A boot sector virus is a computer virus that infects a storage device’s master boot record (MBR). The virus moves the boot sector to another location on the hard drive.
References: https://www.techopedia.com/definition/26655/boot-sector-virus