PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

?What software application could you use to hide the data on the CD's and USB flash drives?

You are the IT manager of a large legal firm in California. Your firm represents many important clients whose names always must remain anonymous to the public. Your boss, Mr. Smith, is always concerned about client information being leaked or revealed to the press or public. You have just finished a complete security overhaul of your information systems including an updated IPS, new firewalls, email encryption, and employee security awareness training. Unfortunately, many of your firm’s clients do not trust technology to completely secure their information, so couriers routinely have to travel back and forth, to and from the office with sensitive information.
Your boss has charged you with figuring out how to secure the information the couriers must transport. You propose that the data be transferred using burned CD’s or USB flash drives. You initially think of encrypting the files, but decide against that method for fear the encryption keys could eventually be broken.?
What software application could you use to hide the data on the CD’s and USB flash drives?

SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)

SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)

Why is Jim having these problems?

Jim was having no luck performing a penetration test on his company’s network. He was running the test from home and had downloaded every security scanner he could lay his hands on. Despite knowing the IP range of all of the systems, and the exact network configuration, Jim was unable to get any useful results. Why is Jim having these problems?

What was used to obtain this output?

While reviewing the results of a scan run against a target network you come across the following:
What was used to obtain this output?

Why would an attacker want to perform a scan on port 137?

Why would an attacker want to perform a scan on port 137?

How is it possible to list processes and uids associated with them in a more reliable manner?

On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned. How is it possible to list processes and uids associated with them in a more reliable manner?

In this context, what would be the most effective method to bridge the knowledge gap between the "black&q

Bob is acknowledged as a hacker of repute and is popular among visitors of ‘underground’ sites. Bob is willing to share his knowledge to those who are willing to learn, and many have expressed their interest in learning from him.
However, this knowledge has risks associated with it, as the same knowledge can be used for malevolent attacks as well. In this context, what would be the most effective method to bridge the knowledge gap between the “black” hats or crackers and the “white” hats or computer security professionals?


Page 53 of 125« First...102030...5152535455...607080...Last »