Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 21 of 101
QUESTION 96

- (Exam Topic 1)
What does a firewall check to prevent particular ports and applications from getting packets into an organization?

  1. A. Transport layer port numbers and application layer headers
  2. B. Presentation layer headers and the session layer port numbers
  3. C. Network layer headers and the session layer port numbers
  4. D. Application layer port numbers and the transport layer headers

Correct Answer: A

QUESTION 97

- (Exam Topic 2)
What is the algorithm used by LM for Windows2000 SAM?

  1. A. MD4
  2. B. DES
  3. C. SHA
  4. D. SSL

Correct Answer: B

QUESTION 98

- (Exam Topic 3)
Roma is a member of a security team. She was tasked with protecting the internal network of an organization from imminent threats. To accomplish this task, Roma fed threat intelligence into the security devices in a digital format to block and identify inbound and outbound malicious traffic entering the organization's network.
Which type of threat intelligence is used by Roma to secure the internal network?

  1. A. Technical threat intelligence
  2. B. Operational threat intelligence
  3. C. Tactical threat intelligence
  4. D. Strategic threat intelligence

Correct Answer: A

QUESTION 99

- (Exam Topic 2)
jane invites her friends Alice and John over for a LAN party. Alice and John access Jane's wireless network without a password. However. Jane has a long, complex password on her router. What attack has likely occurred?

  1. A. Wireless sniffing
  2. B. Piggybacking
  3. C. Evil twin
  4. D. Wardriving

Correct Answer: C
An evil twin may be a fraudulent Wi-Fi access point that appears to be legitimate but is about up to pay attention to wireless communications.[1] The evil twin is that the wireless LAN equivalent of the phishing scam.This type of attack could also be wont to steal the passwords of unsuspecting users, either by monitoring their connections or by phishing, which involves fixing a fraudulent internet site and luring people there.The attacker snoops on Internet traffic employing a bogus wireless access point. Unwitting web users could also be invited to log into the attacker’s server, prompting them to enter sensitive information like usernames and passwords. Often, users are unaware they need been duped until well after the incident has occurred.When users log into unsecured (non-HTTPS) bank or e-mail accounts, the attacker intercepts the transaction, since it’s sent through their equipment. The attacker is additionally ready to hook up with other networks related to the users’ credentials.Fake access points are found out by configuring a wireless card to act as an access point (known as HostAP). they’re hard to trace since they will be shut off instantly. The counterfeit access point could also be given an equivalent SSID and BSSID as a close-by Wi-Fi network. The evil twin are often configured to pass Internet traffic through to the legitimate access point while monitoring the victim’s connection, or it can simply say the system is temporarily unavailable after obtaining a username and password.

QUESTION 100

- (Exam Topic 2)
Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the targets MSP provider by sending spear-phishing emails and distributed custom-made malware to compromise user accounts and gain remote access to the cloud service. Further, she accessed the target customer profiles with her MSP account, compressed the customer data, and stored them in the MSP. Then, she used this information to launch further attacks on the target organization. Which of the following cloud attacks did Alice perform in the above scenario?

  1. A. Cloud hopper attack
  2. B. Cloud cryptojacking
  3. C. Cloudborne attack
  4. D. Man-in-the-cloud (MITC) attack

Correct Answer: A
Operation Cloud Hopper was an in depth attack and theft of data in 2017 directed at MSP within the uk (U.K.), us (U.S.), Japan, Canada, Brazil, France, Switzerland, Norway, Finland, Sweden, South Africa , India,
Thailand, South Korea and Australia. The group used MSP as intermediaries to accumulate assets and trade secrets from MSP client engineering, MSP industrial manufacturing, retail, energy, pharmaceuticals, telecommunications, and government agencies.Operation Cloud Hopper used over 70 variants of backdoors, malware and trojans. These were delivered through spear-phishing emails. The attacks scheduled tasks or leveraged services/utilities to continue Microsoft Windows systems albeit the pc system was rebooted. It installed malware and hacking tools to access systems and steal data.

Page 21 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: