PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

What has Tarik set up here to catch employees accessing unauthorized documents?

Tarik is the systems administrator for Qwerty International, a computer parts manufacturing company in San Francisco. Tarik just passed his certified ethical hacker test and now wants to implement many of the things he learned in class. The first project that Tarik completes is to create IT security policies thatcover everything security related from logical to physical. Through managementapproval, all employees must sign and agree to the policies or face disciplinary action. One policy in particular, network file access, is of importance to Tarik and his superiors because of past incidents where employees accessed unauthorized documents. Tarik has fine-tuned the ACL’s to where no one can access information outside of their department’s network folder. To catch anyone that might attempt to access unauthorized files or folders, Tarik creates a folder in theroot of the network file share. Tarik names this folder “HR-Do Not Open”. Inthis folder, Tarik creates many fake HR documents referring to personal information of employees that do not exist. In each document, he places headers and footers that read “Do Not Print or Save”. Then Tarik sets up logging and monitoring to see if anyone accesses the folder and its contents. After only one week, Tarik records two separate employees opening the fake HR files, printing them, and saving them to their personal directories. What has Tarik set up here to catch employees accessing unauthorized documents?

What tech nique was used by the Kiley Innovators employee to send information to the rivalmarketing company?

Lori is a certified ethical hacker as well as a certified hacking forensics investigator working as an IT security consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recently underwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing company came out with an exact duplicate product right before Kiley Innovators was abo ut to release it. The executive team believes that an employee is leaking information to the rival company. Lori questions all employees, reviews server logs,and firewall logs; after which she finds nothing. Lori is then given permission to search through the corporate email system. She searches by email being sent to and sent from the rival marketing company. She finds one employee that appears to be sending very large email to this other marketing company, even thoughthey should have no reason to be communicating with them. Lori tracks down theactual emails sent and upon opening them, only finds picture files attached tothem. These files seem perfectly harmless, usually containing some kind of joke. Lori decides to use some special software to further examine the pictures andfinds that each one had hidden text that was stored in each picture. What tech nique was used by the Kiley Innovators employee to send information to the rivalmarketing company?

What type of insider threat would Shayla be considered?

Shayla is an It security consultant, specializing in social engineering andexternal penetration tests. Shayla has been hired on by Treks Avionics, a subcontractor for the Department of Defense. Shayla has been given authority to perform any and all tests necessary to audit the company’s network security. No employees for the company, other than the IT director, know about Shayla’s work shewill be doing. Shayla’s first step is to obtain a list of employees through company website contact pages. Then she befriends a female employee of the company through an online chat website. After meeting with the female employee numerous times, Shayla is able to gain her trust and they become friends. One day, Shayla steals the employee’s access badge and uses it to gain unauthorized accessto the Treks Avionics offices. What type of insider threat would Shayla be considered?

What built-in Windows feature could you have implemented to protect the sensitive information on these laptops

You are the CIO for Avantes Finance International, a global finance companybased in Geneva. You are responsible for network functions and logical securitythroughout the entire corporation. Your company has over 250 servers running Windows Server, 5000 workstations running Windows Vista, and 200 mobile users working from laptops on Windows XP. Last week, 10 of your company’s laptops were stolen from salesmen while at a conference in Amsterdam. These laptops containedproprietary company information. While doing damage assessment on the possiblepublic relations nightmare this may become, a news story leaks about the stolenlaptops and also that sensitive information from those computers was posted toa blog online. What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?

Why can’t Bonnie get NetDefender to start on her Windows computers?

Bonnie is an IT security consultant currently working out of her home. Sheis able to perform much of her job through her home network when performing external footprinting, scanning, and pen testing. Bonnie has a number of computersrunning on different operating systems from Windows XP SP2 to Fedora. She usestwo desktops that run as servers for her home network; handing out DHCP numbers,performing DNS lookups, and so on. Bonnie also utilizes an IDS to watch any traffic that might try to get into her network. One day, Bonnie sees some odd traffic trying to connect to her internal computers. Bonnie decides to download and install NetDefender on her Windows computers to block malicious traffic. Allof her Windows computers are running Windows XP SP2 with the default install. Bonnie tries to start NetDefender, but receives an error that it cannot start. Why can’t Bonnie get NetDefender to start on her Windows computers?

What has Natalie discovered here in the source code?

Natalie is the IT security administrator for Sheridan Group, an investment company based in Detroit. Natalie has been getting reports from the help desk that users are having issues when they go to a particular vendor’s website; a company that sells paper. They report strange browser behavior such as pop-ups, browser redirection, and so on. These users also state they have been getting SPAM related to paper products, similar to those being provided by the vendor. Natalie scans these computers for viruses, adware, and spyware and turns up nothing.Natalie has one of these users navigate to the vendor’s website and sees the odd browser behavior. Natalie decides to take a look at the source code of thatwebsite to see if she can pull out anything of use. Natalie finds many places in the source code referring to a jpg file that is only one pixel in height and one pixel in width. What has Natalie discovered here in the source code?

What no-cost setting could Jacob make to stop pop-ups on these computers?

Jacob is the network administrator for Richardson Electric, a heating and air conditioning company based out of Wichita. Jacob is responsible for the entire corporate network, including its security. Jacob has recently been receivingnumerous calls from users stating that they receive pop-ups all the time. Theseusers’ computers are all running Windows XP SP2. Jacob checks their Internet Explorer settings and the pop-up blocker is on for every machine. Jacob decidesto install a couple of other free browsers that have pop-up blockers, and the computers still receive numerous pop-ups. Jacob downloads free spyware and adwareremoval software to scan these computers. The scans return no results, and thecomputers are still getting numerous pop-ups. Jacob does not have any money inhis budget to buy any commercial products to stop this issue. What no-cost setting could Jacob make to stop pop-ups on these computers?

What should Frederick’s answer be?

Frederick is a security research analyst for the Department of Defense. Fre derick was recently assigned to the cyber defense unit based in Washington D.C.He has been researching terrorist activity online through bulletin boards, social networking sites, and other extremist websites. One of Frederick’s colleagues was able to obtain a copy of Mujahedeen Secrets 2 for him to check out. WhenFrederick’s boss hears of this, he tells Frederick he wants to be briefed on every aspect of the software within 2 days. Since the help file was in Arabic, Frederick had to translate the 60 some odd pages which took him over 6 hours. By the time that his boss’ briefing came around, Frederick was only able to researchand look through half of the application. Frederick’s boss asks him specifically about the File Shredder module of the software; which Frederick was not ableto research. Frederick’s boss wants to know what the maximum number of passes t he program uses when deleting files from a computer. What should Frederick’s answer be?

What file should Stephan look for on the computer if he wants to find the file that stores all the keys used b

Stephan is the senior security analyst for NATO, currently working out of Amsterdam. Stephan has been assigned to research terrorist activities, specifically cyber Jihad. Stephan was recently given a computer that was seized from a terrorist cell in London. After breaking through the disk encryption, Stephan andhis team were able to read files and their contents on the computer. Stephan f ound a copy of Mujahedeen Secrets 2 in a hidden folder that the terrorists wereapparently using to hide their communications on the Internet. Unfortunately, the other files used by the application were not in that same directory. What file should Stephan look for on the computer if he wants to find the file that stores all the keys used by Mujahedeen Secrets 2?


Page 7 of 125« First...56789...203040...Last »