312-50v10 Questions

312-50v10 FAQs

Question # 1   

Which service in a PKI will vouch for the identity of an individual or company?

A. KDC

B. CR

C. CBC

D. CA

Correct Answer: D

Question # 2  

Which is the first step followed by Vulnerability Scanners for scanning a network?

A. OS Detection

B. Firewall detection

C. TCP/UDP Port scanning

D. Checking if the remote host is alive

Correct Answer: D

Question #3

In an internal security audit, the white hat hacker gains control over a user account and attempts to acquire access to another account’s confidential files and information. How can he achieve this?

A. Privilege Escalation

B. Shoulder-Surfing

C. Hacking Active Directory

D. Port Scanning

Correct Answer: A

Question # 4  

Which of the following is an extremely common IDS evasion technique in the web world?

A. Spyware

B. Subnetting

C. Unicode Characters

D. Port Knocking

Correct Answer: C

Question # 5

What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?

A. Residual risk

B. Impact risk

C. Deferred risk

D. Inherent risk

Correct Answer: A

Question # 6

You have successfully comprised a server having an IP address of 10.10.0.5. You would like to enumerate all machines in the same network quickly.

What is the best Nmap command you will use?

A. nmap -T4 -q 10.10.0.0/24

B. nmap -T4 -F 10.10.0.0/24

C. nmap -T4 -r 10.10.1.0/24

D. nmap -T4 -O 10.10.0.0/24

Correct Answer: B

Question # 7

Although FTP traffic is not encrypted by default, which layer 3 protocol would allow for end-to-end encryption of the connection?

A. SFTP

B. Ipsec

C. SSL

D. FTPS

Correct Answer: B

Question # 8

You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8.

While monitoring the data, you find a high number of outbound connections. You see that IP’s owned by XYZ (Internal) and private IP’s are communicating to a

Single Public IP. Therefore, the Internal IP’s are sending data to the Public IP.

After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices are compromised.

What kind of attack does the above scenario depict?

A. Botnet Attack

B. Spear Phishing Attack

C. Advanced Persistent Threats

D. Rootkit Attack

Correct Answer: A

Question #  9

Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in bounds checking mechanism?

Code:

A. C#

B. Python

C. Java

D. C+

Correct Answer: D

Question # 10

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the

Operating System

(OS) version installed. Considering that NMAP result below, which of the following is likely to be installed on the target machine by the OS?

A. The host is likely a Linux machine.

B. The host is likely a printer.

C. The host is likely a router.

D. The host is likely a Windows machine.

Correct Answer: B

Question # 11

The collection of potentially actionable, overt, and publicly available information is known as

A. Open-source intelligence

B. Real intelligence

C. Social intelligence

D. Human intelligence

Correct Answer: A

Question #12

What is not a PCI compliance recommendation?

A. Use a firewall between the public network and the payment card data.

B. Use encryption to protect all transmission of card holder data over any public network.

C. Rotate employees handling credit card transactions on a yearly basis to different departments.

D. Limit access to card holder data to as few individuals as possible.

Correct Answer: C

Question # 13

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company.

This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO,

President, or Managers. The time a hacker spends performing research to locate this information about a company is known as?

A. Exploration

B. Investigation

C. Reconnaissance

D. Enumeration

Correct Answer: C

Question # 14

Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?

A. A biometric system that bases authentication decisions on behavioral attributes.

B. A biometric system that bases authentication decisions on physical attributes.

C. An authentication system that creates one-time passwords that are encrypted with secret keys.

D. An authentication system that uses passphrases that are converted into virtual passwords.

Correct Answer: C

Question # 15

Why is a penetration test considered to be more thorough than vulnerability scan?

A. Vulnerability scans only do host discovery and port scanning by default.

B. A penetration test actively exploits vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.

C. It is not ג€” a penetration test is often performed by an automated tool, while a vulnerability scan requires active engagement.

D. The tools used by penetration testers tend to have much more comprehensive vulnerability databases.

Correct Answer: B

Question # 16

You are a Network Security Officer. You have two machines. The first machine (192.168.0.99) has snort installed, and the second machine

(192.168.0.150) has kiwi syslog installed. You perform a syn scan in your network, and you notice that kiwi syslog is not receiving the alert message from snort. You decide to run wireshark in the snort machine to check if the messages are going to the kiwi syslog machine. What

Wireshark filter will show the connections from the snort machine to kiwi syslog machine?

A. tcp.srcport= = 514 && ip.src= = 192.168.0.99

B. tcp.srcport= = 514 && ip.src= = 192.168.150

C. tcp.dstport= = 514 && ip.dst= = 192.168.0.99

D. tcp.dstport= = 514 && ip.dst= = 192.168.0.150

Correct Answer: D

Question # 17

You have gained physical access to a Windows 2008 R2 server, which has an accessible disc drive. When you attempt to boot the server and log

in, you are unable to guess the password. In your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any user’s

password or activate disabled Windows accounts?

A. John the Ripper

B. SET

C. CHNTPW

D. Cain & Abel

Correct Answer: C

Question # 18

Which of the following incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an organization?

A. Preparation phase

B. Containment phase

C. Identification phase

D. Recovery phase

Correct Answer: A

Question # 19

Peter is surfing the internet looking for information about DX Company. Which hacking process is Peter doing?

A. Scanning

B. Footprinting

C. Enumeration

D. System Hacking

Correct Answer: B

Question # 20

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

A. Session hijacking

B. Firewalking

C. Man-in-the middle attack

D. Network sniffing

Correct Answer: B

Question # 21

The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?

A. ACK

B. SYN

C. RST

D. SYN-ACK

Correct Answer: B

Question # 22

Which of the following Linux commands will resolve a domain name into IP address?

A. >host-t a hackeddomain.com

B. >host-t ns hackeddomain.com

C. >host -t soa hackeddomain.com

D. >host -t AXFR hackeddomain.com

Correct Answer: A

Question # 23

Your company was hired by a small healthcare provider to perform a technical assessment on the network. What is the best approach for discovering vulnerabilities on a Windows-based computer?

A. Use the built-in Windows Update tool

B. Use a scan tool like Nessus

C. Check MITRE.org for the latest list of CVE findings

D. Create a disk image of a clean Windows installation

Correct Answer: B

Question # 24

You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration?

A. A firewall IPTable

B. FTP Server rule

C. A Router IPTable

D. An Intrusion Detection System

Correct Answer: D

Question # 25

The Heartbleed bug was discovered in 2014 and is widely referred to under MITRE’s Common Vulnerabilities and Exposures (CVE) as CVE-2014-

0160. This bug affects the OpenSSL implementation of the Transport Layer Security (TLS) protocols defined in RFC6520.

What type of key does this bug leave exposed to the Internet making exploitation of any compromised system very easy?

A. Public

B. Private

C. Shared

D. Root

Correct Answer: B

Question # 26  

Which of the following commands checks for valid users on an SMTP server?

A. RCPT

B. CHK

C. VRFY

D. EXPN

Correct Answer: C

Question # 27

John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using

PGP. What should John do to communicate correctly using this type of encryption?

A. Use his own private key to encrypt the message.

B. Use his own public key to encrypt the message.

C. Use Marie’s private key to encrypt the message.

D. Use Marie’s public key to encrypt the message.

Correct Answer: D

Question # 28   

What is the port to block first in case you are suspicious that an IoT device has been compromised?

A. 22

B. 48101

C. 80

D. 443

Correct Answer: B

Question # 29   

Richard, an attacker, targets an MNC. In this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this

information, he creates a map of the organization’s network and misleads domain owners with social engineering to obtain internal details of its network.

What type of footprinting technique is employed by Richard?

A. VoIP footprinting

B. Email footprinting

C. Whois footprinting

D. VPN footprinting

Correct Answer: C

Question # 30  

An organization is performing a vulnerability assessment for mitigating threats. James, a pen tester, scanned the organization by building an inventory of the protocols found on the organization’s machines to detect which ports are attached to services such as an email server, a web server, or a database server. After identifying the services, he selected the vulnerabilities on each machine and started executing only the relevant tests.

What is the type of vulnerability assessment solution that James employed in the above scenario?

A. Service-based solutions

B. Product-based solutions

C. Tree-based assessment

D. Inference-based assessment

Correct Answer: D

Question # 31   

Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

A. Scanning

B. Gaining access

C. Maintaining access

D. Reconnaissance

Correct Answer: B

Question # 32   

Which file is a rich target to discover the structure of a website during web-server footprinting?

A. domain.txt

B. Robots.txt

C. Document root

D. index.html

Correct Answer: B

Question # 33   

Bella, a security professional working at an IT firm, finds that a security breach has occurred while transferring important files. Sensitive data, employee usernames, and passwords are shared in plaintext, paving the way for hackers to perform successful session hijacking. To address this situation, Bella implemented a protocol that sends data using encryption and digital certificates.

Which of the following protocols is used by Bella?

A. FTPS

B. FTP

C. HTTPS

D. IP

Correct Answer: A

Question # 34   

In this form of encryption algorithm, every individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits.

Which is this encryption algorithm?

A. IDEA

B. Triple Data Encryption Standard

C. AES

D. MD5 encryption algorithm

Correct Answer: B

Question # 35   

John, a professional hacker, decided to use DNS to perform data exfiltration on a target network. In this process, he embedded malicious data into the DNS protocol packets that even DNSSEC cannot detect. Using this technique, John successfully injected malware to bypass a firewall and maintained communication with the victim machine and C&C server.

What is the technique employed by John to bypass the firewall?

A. DNSSEC zone walking

B. DNS cache snooping

C. DNS enumeration

D. DNS tunneling method

Correct Answer: D

Question # 36   

Joe works as an IT administrator in an organization and has recently set up a cloud computing service for the organization. To implement this

service, he reached out to a telecom company for providing Internet connectivity and transport services between the organization and the cloud

service provider.

In the NIST cloud deployment reference architecture, under which category does the telecom company fall in the above scenario?

A. Cloud consumer

B. Cloud broker

C. Cloud auditor

D. Cloud carrier

Correct Answer: D

Question # 37   

This form of encryption algorithm is a symmetric key block cipher that is characterized by a 128-bit block size, and its key size can be up to 256 bits. Which among the following is this encryption algorithm?

A. HMAC encryption algorithm

B. Twofish encryption algorithm

C. IDEA

D. Blowfish encryption algorithm

Correct Answer: B

Question # 38   

Suppose that you test an application for the SQL injection vulnerability. You know that the backend database is based on Microsoft SQL Server. In

the login/ password form, you enter the following credentials:

Based on the above credentials, which of the following SQL commands are you expecting to be executed by the server, if there is indeed an SQL

injection vulnerability?

A. select * from Users where UserName = ‘attack’ ‘ or 1=1 — and UserPassword = ‘123456’

B. select * from Users where UserName = ‘attack’ or 1=1 — and UserPassword = ‘123456’

C. select * from Users where UserName = ‘attack or 1=1 — and UserPassword = ‘123456’

D. select * from Users where UserName = ‘attack’ or 1=1 –‘ and UserPassword = ‘123456’

Correct Answer: D

Question # 39   

Jane, an ethical hacker, is testing a target organization’s web server and website to identify security loopholes. In this process, she copied the

entire website and its content on a local drive to view the complete profile of the site’s directory structure, file structure, external links, images,

web pages, and so on. This information helps Jane map the website’s directories and gain valuable information.

What is the attack technique employed by Jane in the above scenario?

A. Session hijacking

B. Website mirroring

C. Website defacement

D. Web cache poisoning

Correct Answer: B

Question # 40   

Samuel, a professional hacker, monitored and intercepted already established traffic between Bob and a host machine to predict Bob’s ISN. Using this ISN,

Samuel sent spoofed packets with Bob’s IP address to the host machine. The host machine responded with a packet having an incremented ISN.

Consequently,

Bob’s connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob.

What is the type of attack performed by Samuel in the above scenario?

A. TCP/IP hijacking

B. Blind hijacking

C. UDP hijacking

D. Forbidden attack

Correct Answer: A

Question # 41   

This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as

GCMP-256, HMACSHA384, and ECDSA using a 384-bit elliptic curve.

Which is this wireless security protocol?

A. WPA3-Personal

B. WPA3-Enterprise

C. WPA2-Enterprise

D. WPA2-Personal

Correct Answer: B

Question # 42  

What piece of hardware on a computer’s motherboard generates encryption keys and only releases a part of the key so that decrypting a disk on a new piece of hardware is not possible?

A. CPU

B. UEFI

C. GPU

D. TPM

Correct Answer: D

Question # 43   

You have been authorized to perform a penetration test against a website. You want to use Google dorks to footprint the site but only want results that show file extensions.

What Google dork operator would you use?

A. inurl

B. site

C. ext

D. filetype

Correct Answer: D

Question # 44   

Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.

Identify the behavior of the adversary in the above scenario.

A. Unspecified proxy activities

B. Use of command-line interface

C. Data staging

D. Use of DNS tunneling

Correct Answer: A

Question  45  

Nicolas just found a vulnerability on a public-facing system that is considered a zero-day vulnerability. He sent an email to the owner of the public

system describing the problem and how the owner can protect themselves from that vulnerability. He also sent an email to Microsoft informing

them of the problem that their systems are exposed to.

What type of hacker is Nicolas?

A. Black hat

B. White hat

C. Gray hat

D. Red hat

Correct Answer: C

Question # 46  

Sam, a professional hacker, targeted an organization with intention of compromising AWS IAM credentials. He attempted to lure one of the employees of the organization by initiating fake calls while posing as a legitimate employee. Moreover, he sent phishing emails to steal the AWS

IAM credentials and further compromise the employee’s account.

What is the technique used by Sam to compromise the AWS IAM credentials?

A. Insider threat

B. Social engineering

C. Password reuse

D. Reverse engineering

Correct Answer: B

Question # 47   

After an audit, the auditors inform you that there is a critical finding that you must tackle immediately. You read the audit report, and the problem is the service running on port 389.

Which service is this and how can you tackle the problem?

A. The service is NTP, and you have to change it from UDP to TCP in order to encrypt it.

B. The service is LDAP, and you must change it to 636, which is LDAPS.

C. The findings do not require immediate actions and are only suggestions.

D. The service is SMTP, and you must change it to SMIME, which is an encrypted way to send emails.

Correct Answer: B

Question # 48   

Robin, a professional hacker, targeted an organization’s network to sniff all the traffic. During this process, Robin plugged in a rogue switch to an

unused port in the LAN with a priority lower than any other switch in the network so that he could make it a root bridge that will later allow him to sniff all the traffic in the network.

What is the attack performed by Robin in the above scenario?

A. ARP spoofing attack

B. STP attack

C. DNS poisoning attack

D. VLAN hopping attack

Correct Answer: B

Question # 49  

Richard, an attacker, aimed to hack IoT devices connected to a target network. In this process, Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the IoT network, which repeats the captured signals of the devices.

What is the type of attack performed by Richard in the above scenario?

A. Cryptanalysis attack

B. Reconnaissance attack

C. Side-channel attack

D. Replay attack

Correct Answer: D

Question # 50   

Consider the following Nmap output:

What command-line parameter could you use to determine the type and version number of the web server?

A. -sV

B. -sS

C. -Pn

D. -V

Correct Answer: A

Pages: 1 2


Tags: