Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
312-50v11
Free trial
Verified
Question 51
Johnson, an attacker, performed online research for the contact details of reputed cybersecurity firms. He found the contact number of sibertech.org and dialed the number, claiming himself to represent a technical support team from a vendor. He warned that a specific server is about to be compromised and requested sibertech.org to follow the provided instructions. Consequently, he prompted the victim to execute unusual commands and install malicious files, which were then used to collect and pass critical information to Johnson's machine.
What is the social engineering technique Steve employed in the above scenario?
- A: Diversion theft
- B: Quid pro quo
- C: Elicitation
- D: Phishing
Question 52
In an attempt to increase the security of your network, you implement a solution that will help keep your wireless network undiscoverable and accessible only to those that know it.
How do you accomplish this?
- A: Delete the wireless network
- B: Lock all users
- C: Disable SSID broadcasting
- D: Remove all passwords
Question 53
Jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However, Jane has a long, complex password on her router. What attack has likely occurred?
- A: Wardriving
- B: Wireless sniffing
- C: Evil twin
- D: Piggybacking
Question 54
To create a botnet, the attacker can use several techniques to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines.
The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.
Which technique is discussed here?
- A: Subnet scanning technique
- B: Permutation scanning technique
- C: Hit-list scanning technique.
- D: Topological scanning technique
Question 55
Louis, a professional hacker, had used specialized tools or search engines to encrypt all his browsing activity and navigate anonymously to obtain sensitive/hidden information about official government or federal databases. After gathering the information, he successfully performed an attack on the target government organization without being traced.
Which of the following techniques is described in the above scenario?
- A: Website footprinting
- B: Dark web footprinting
- C: VPN footprinting
- D: VoIP footprinting
Question 56
An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization's machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.
What is the type of vulnerability assessment solution that James employed in the above scenario?
- A: Service-based solutions
- B: Product-based solutions
- C: Tree-based assessment
- D: Inference-based assessment
Question 57
Due to a slowdown of normal network operations, the IT department decided to monitor internet traffic for all of the employees. From a legal standpoint, what would be troublesome to take this kind of measure?
- A: All of the employees would stop normal work activities
- B: IT department would be telling employees who the boss is
- C: Not informing the employees that they are going to be monitored could be an invasion of privacy.
- D: The network could still experience traffic slow down.
Question 58
Dorian is sending a digitally signed email to Poly. With which key is Dorian signing this message and how is Poly validating it?
- A: Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian's private key.
- B: Dorian is signing the message with Poly's private key, and Poly will verify that the message came from Dorian by using Dorian's public key.
- C: Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian's public key.
- D: Dorian is signing the message with Poly's public key, and Poly will verify that the message came from Dorian by using Dorian's public key.
Question 59
At what stage of the cyber kill chain theory model does data exfiltration occur?
- A: Weaponization
- B: Actions on objectives
- C: Command and control
- D: Installation
Question 60
Heather's company has decided to use a new customer relationship management tool. After performing the appropriate research, they decided to purchase a subscription to a cloud-hosted solution. The only administrative task that Heather will need to perform is the management of user accounts. The provider will take care of the hardware, operating system, and software administration including patching and monitoring.
Which of the following is this type of solution?
- A: Iaas
- B: Saas
- C: PaaS
- D: Caas
Question 61
By performing a penetration test, you gained access under a user account. During the test, you established a connection with your own machine via the SMB service and occasionally entered your login and password in plaintext.
Which file do you have to clean to clear the password?
- A: .xsession-log
- B: .profile
- C: .bashrc
- D: .bash_history
Question 62
Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?
- A: Scanning
- B: Gaining access
- C: Maintaining access
- D: Reconnaissance
Question 63
John is investigating web-application firewall logs and observers that someone is attempting to inject the following:
What type of attack is this?
- A: SQL injection
- B: Buffer overflow
- C: CSRF
- D: XSS
Question 64
Mr. Omkar performed tool-based vulnerability assessment and found two vulnerabilities. During analysis, he found that these issues are not true vulnerabilities.
What will you call these issues?
- A: False positives
- B: True negatives
- C: True positives
- D: False negatives
Question 65
Which file is a rich target to discover the structure of a website during web-server footprinting?
- A: domain.txt
- B: Robots.txt
- C: Document root
- D: index.html
Question 66
What is the common name for a vulnerability disclosure program opened by companies in platforms such as HackerOne?
- A: White-hat hacking program
- B: Bug bounty program
- C: Ethical hacking program
- D: Vulnerability hunting program
Question 67
There are multiple cloud deployment options depending on how isolated a customer's resources are from those of other customers. Shared environments share the costs and allow each customer to enjoy lower operations expenses. One solution is for a customer to join with a group of users or organizations to share a cloud environment.
What is this cloud deployment option called?
- A: Private
- B: Community
- C: Public
- D: Hybrid
Question 68
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGIs?
- A: Nikto
- B: John the Ripper
- C: Dsniff
- D: Snort
Question 69
Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices hidden by a restrictive firewall in the IPv4 range in a given target network.
Which of the following host discovery techniques must he use to perform the given task?
- A: UDP scan
- B: ARP ping scan
- C: ACK flag probe scan
- D: TCP Maimon scan
Question 70
An organization has automated the operation of critical infrastructure from a remote location. For this purpose, all the industrial control systems are connected to the Internet. To empower the manufacturing process, ensure the reliability of industrial networks, and reduce downtime and service disruption, the organization decided to install an OT security tool that further protects against security incidents such as cyber espionage, zero-day attacks, and malware.
Which of the following tools must the organization employ to protect its critical infrastructure?
- A: Robotium
- B: BalenaCloud
- C: Flowmon
- D: IntentFuzzer
Question 71
Ralph, a professional hacker, targeted Jane, who had recently bought new systems for her company. After a few days, Ralph contacted Jane while masquerading as a legitimate customer support executive, informing that her systems need to be serviced for proper functioning and that customer support will send a computer technician. Jane promptly replied positively. Ralph entered Jane's company using this opportunity and gathered sensitive information by scanning terminals for passwords, searching for important documents in desks, and rummaging bins.
What is the type of attack technique Ralph used on Jane?
- A: Impersonation
- B: Dumpster diving
- C: Shoulder surfing
- D: Eavesdropping
Question 72
Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates.
Which of the following protocols is used by Bella?
- A: FTPS
- B: FTP
- C: HTTPS
- D: IP
Question 73
Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.
What type of malware did the attacker use to bypass the company's application whitelisting?
- A: File-less malware
- B: Zero-day malware
- C: Phishing malware
- D: Logic bomb malware
Question 74
Kevin, a professional hacker, wants to penetrate CyberTech Inc's network. He employed a technique, using which he encoded packets with Unicode characters.
The company's IDS cannot recognize the packets, but the target web server can decode them.
What is the technique used by Kevin to evade the IDS system?
- A: Session splicing
- B: Urgency flag
- C: Obfuscating
- D: Desynchronization
Question 75
To invisibly maintain access to a machine, an attacker utilizes a rootkit that sits undetected in the core components of the operating system. What is this type of rootkit an example of?
- A: Hypervisor rootkit
- B: Kernel rootkit
- C: Hardware rootkit
- D: Firmware rootkit
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!