ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Prüfungsfragen mit Lösungen:
1. In both pharming and phishing attacks, an attacker can create websites that look similar to legitimate sites with the intent of collecting personal identifiable information from its victims.
What is the difference between pharming and phishing attacks?
A) In a pharming attack, a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a phishing attack, an attacker provides the victim with a URL that is either misspelled or looks similar to the actual website's domain name.
B) In a phishing attack, a victim is redirected to a fake website by modifying their host configuration file or by exploiting vulnerabilities in DNS. In a pharming attack, an attacker provides the victim with a URL that is either misspelled or looks very similar to the actual website's domain name.
C) Both pharming and phishing attacks are purely technical and are not considered forms of social engineering.
D) Both pharming and phishing attacks are identical.
2. Elliot is exploiting a web application vulnerable to SQL injection. He has introduced conditional timing delays to determine whether the injection is successful.
What type of SQL injection is Elliot most likely performing?
A) Union-based SQL injection
B) NoSQL injection
C) Error-based SQL injection
D) Blind SQL injection
3. Widespread fraud ac Enron. WorldCom, and Tyco led to the creation of a law that was designed to improve the accuracy and accountability of corporate disclosures. It covers accounting firms and third parties that provide financial services to some organizations and came into effect in 2002. This law is known by what acronym?
A) PCIDSS
B) Fed RAMP
C) SOX
D) HIPAA
4. Bob is acknowledged as a hacker of repute and is popular among visitors of "underground" sites. Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.
In this context, what would be the most effective method to bridge the knowledge gap between the "black" hats or crackers and the "white" hats or computer security professionals?
A) Hire more computer security monitoring personnel to monitor computer systems and networks.
B) Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.
C) Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.
D) Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.
5. Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?
A) Port 53
B) Port 80
C) Port 23
D) Port 50
Fragen und Antworten:
1. Frage Antwort: A | 2. Frage Antwort: D | 3. Frage Antwort: C | 4. Frage Antwort: D | 5. Frage Antwort: A |