Call
whatsapp
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
9447387064 | 9847003556
0471-2335855 | 8089080088 | 0471-2334855
Cisco Training in Trivandrum, Trinity Technologies

No.1 Training Institute in Kerala

CEH QUESTIONS : PART 61

email is transmitted across the internet using the smtp . it does notencrypt email, leaving the information in the message vulnerable to being read by an unauthorized person , SMTP can upgrade a comnnection between 2 mail servers to use TLS . Email transmitted by SMTP over tls is encrypted what is the name of the command uesed by SMTp to transmit email over TLS

OPPORTUNISTIC TLS

UPGRADE TLS

FOURE TLS

STARTTLS

SHOW ANSWER

Company's policy requires employees to perform file transfer using protocol which encrypt traffic. You suspect some employees are still performing file transfers using unencrypted protocols because the employees do not like changes . you have positioned a network sniffer to capture traffic from the laptops used by the employees in the data ingest department. using wireshark to examine the capture traffic which command can be used as a display filter to find unencrypted file transfer?

 

Tcp.port !=21

Tcp.port ==21|| Tcp.port ==22

Tcp.port ==21

Tcp.port ==23

SHOW ANSWER

What is the purpose of DNS AAAA record?

IPv6 address resolution records

address database record 

Authorization, Authentication and auditing record

address prefix record

SHOW ANSWER

Log monitoring tools performing behavioural analysis have alerts several suspicious logins on a Linux server occurring during non-business hours. After further examination of all login actives its noticed that none of the logins have occurred during the typical work hours. A Linux administrator who is investigating this problem realizes the system time on the Linux server is wrong by more than 12 hours. what protocol used on Linux servers to synchronize the time has stoped working?

 

Time keeper

OSPF

 PPP

NTP                         SHOW ANSWER

Which of the following is NOT correct about the usefulness of vulnerability scanning.

Check compliance with host application usage and security policies

Provide information on how to mitigate discovered vulnerabilities

Provide the environment to be able to safely penetrate vulnerable systems

Provide information on targets for penetration testing

SHOW ANSWER

Darius is analysing logs from IDS. He want to understand what have triggered one alert and verify if it’s true positive or false positive. Looking at the logs he copy and paste basic details like below
destination IP: 192.168.10.23
destination port: 63221
source IP: 192.168.21.100
source port: 80

 

This is most probably true positive which trigged on secure communication between client and sever.

This is most probably true negative

This is most probably false positive , bacasue an alert triggered on reversed traffic

This is most probably false positive ,  IDS is monitoring one direction traffic.

SHOW ANSWER

When configuring wireless on his home router, Javik disables SSID broadcast. He leaves authentication “open”, but sets the SSID to a 32-character string of random letters and numbers. What is an accurate assessment of this scenario from a security perspective?

Disabling SSID broadcast prevents 802.11 beacons from being transmitted from the access point, resulting in a valid setup leveraging “security through obscurity”.

Since the SSID is required in order to connect, the 32-character string is sufficient to prevent brute-force attacks

Javik’s router is still vulnerable to wireless hacking attempts, because the SSID broadcast setting can be enabled using a specially crafted packet sent to the hardware address of the access point.

It is still possible for a hacker to connect to the network after sniffing the SSID from a successful wireless association.

SHOW ANSWER

A pen tester is configuring a windows laptop for a test. In setting up Wireshark, what river and library are required to allow the NIC to work in promiscuous mode?

Winprom

Winpsw

Libpcap

Winpcap

SHOW ANSWER

which of the below hashing functions are not recommended for used

 

SHA2, SHA3,

MD5, SHA 1

SHA1 ECC

MD5, SHA5

SHOW ANSWER

You are logged in as a local admin on a Windows 7 system and you need to launch the Computer Management Console from the command line. Which command would you use?

c:\win...\ncpa.cpl

c:\win...\gpedit

c:\win...\compmgmt.msc

c:\win...\services.exedsd

SHOW ANSWER

Your business has decided to add credit card numbers to the data it backs up to tape. Which of the following represents the best practice your business should observe?

Encrypt backup tapes that are sent off-site.

Do not back up either the credit card numbers or their hashes.

Back up the hashes of the credit card numbers, not the actual credit card numbers.ss

Hire a security consultant to provide direction.

SHOW ANSWER

Which of the following is a wireless network detector that is commonly found on Linux?

Kismet 

Abel 

 Netstumbler 

Nessus

SHOW ANSWER

A security consultant decides to use multiple layers of anti-virus defense, such as end user desktop anti-virus and E-mail gateway. This approach can be used to mitigate which kind of attack?

 Forensic attack 

ARP spoofing attack 

Social engineering attack 

Scanning attack

SHOW ANSWER

Code injection is a form of attack in which a malicious user:

 Inserts text into a data field that gets interpreted as code 

Gets the server to execute arbitrary code using a buffer overflow 

Inserts additional code into the JavaScript running in the browser 

Gains access to the codebase on the server and inserts new code

SHOW ANSWER
BACK | NEXT
TRINITY SOFTWARE SOLUTIONS,IInd floor, Radheyam Towers, Gandhari Amman Kovil Road, Pulimood, Trivandrum - 1
0471-2334855 | 2335855 | 9447387064 | 9847003556 info@trinitytechnology.in