[2023年11月] 最新の312-50v11試験問題集には合格保証が付きます [Q20-Q43]

Share

[2023年11月] 最新の312-50v11試験問題集には合格保証が付きます

信頼できるCEH v11 312-50v11問題集PDFで2023年11月14日に更新された問題

質問 # 20
Clark is a professional hacker. He created and configured multiple domains pointing to the same host to switch quickly between the domains and avoid detection.
Identify the behavior of the adversary In the above scenario.

  • A. use of command-line interface
  • B. Use of DNS tunneling
  • C. Unspecified proxy activities
  • D. Data staging

正解:C

解説:
A proxy server acts as a gateway between you and therefore the internet. It's an intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy counting on your use case, needs, or company policy. If you're employing a proxy server, internet traffic flows through the proxy server on its thanks to the address you requested. A proxy server is essentially a computer on the web with its own IP address that your computer knows. once you send an internet request, your request goes to the proxy server first. The proxy server then makes your web request on your behalf, collects the response from the online server, and forwards you the online page data so you'll see the page in your browser.


質問 # 21
Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored?

  • A. symmetric algorithms
  • B. hashing algorithms
  • C. asymmetric algorithms
  • D. integrity algorithms

正解:B


質問 # 22
Identify the correct terminology that defines the above statement.

  • A. Designing Network Security
  • B. Penetration Testing
  • C. Security Policy Implementation
  • D. Vulnerability Scanning

正解:B


質問 # 23
This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-2S6. MMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?

  • A. WPA2-Enterprise
  • B. WPA2 Personal
  • C. WPA3-Personal
  • D. WPA3-Enterprise

正解:D

解説:
Enterprise, governments, and financial institutions have greater security with WPA3-Enterprise. WPA3-Enterprise builds upon WPA2 and ensures the consistent application of security protocol across the network. WPA3-Enterprise also offers an optional mode using 192-bit minimum-strength security protocols and cryptographic tools to raised protect sensitive data: * Authenticated encryption: 256-bit Galois/Counter Mode Protocol (GCMP-256) * Key derivation and confirmation: 384-bit Hashed Message Authentication Mode (HMAC) with Secure Hash Algorithm (HMAC-SHA384) * Key establishment and authentication: Elliptic Curve Diffie-Hellman (ECDH) exchange and Elliptic Curve Digital Signature Algorithm (ECDSA) employing a 384-bit elliptic curve * Robust management frame protection: 256-bit Broadcast/Multicast Integrity Protocol Galois Message Authentication Code (BIP-GMAC-256) The 192-bit security mode offered by WPA3-Enterprise ensures the proper combination of cryptographic tools are used and sets a uniform baseline of security within a WPA3 network.
It protects sensitive data using many cryptographic algorithms It provides authenticated encryption using GCMP-256 It uses HMAC-SHA-384 to generate cryptographic keys It uses ECDSA-384 for exchanging keys


質問 # 24
If executives are found liable for not properly protecting their company's assets and information systems, what type of law would apply in this situation?

  • A. Common
  • B. Civil
  • C. Criminal
  • D. International

正解:B


質問 # 25
Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?

  • A. [site:]
  • B. [info:]
  • C. [inurl:]
  • D. [related:]

正解:D

解説:
related:This operator displays websites that are similar or related to the URL specified.


質問 # 26
An organization decided to harden its security against web-application and web-server attacks. John, a security personnel in the organization, employed a security scanner to automate web-application security testing and to guard the organization's web infrastructure against web-application threats. Using that tool, he also wants to detect XSS, directory transversal problems, fault injection, SQL injection, attempts to execute commands, and several other attacks. Which of the following security scanners will help John perform the above task?

  • A. Cisco ASA
  • B. AlienVault®OSSIM™
  • C. Saleae Logic Analyzer
  • D. ASyhunt Hybrid

正解:D


質問 # 27
There have been concerns in your network that the wireless network component is not sufficiently secure. You perform a vulnerability scan of the wireless network and find that it is using an old encryption protocol that was designed to mimic wired encryption.
What encryption protocol is being used?

  • A. RADIUS
  • B. WEP
  • C. WPA
  • D. WPA3

正解:B


質問 # 28
David is a security professional working in an organization, and he is implementing a vulnerability management program in the organization to evaluate and control the risks and vulnerabilities in its IT infrastructure. He is currently executing the process of applying fixes on vulnerable systems to reduce the impact and severity of vulnerabilities. Which phase of the vulnerability-management life cycle is David currently in?

  • A. verification
  • B. Vulnerability scan
  • C. Risk assessment
  • D. Remediation

正解:D

解説:
Explanation
Its allude to play out the means that utilization to alleviate the established weaknesses as per scan level. In this stage reaction group plan moderation cycle to cover weaknesses.
* Prioritize proposals
* Design an activity intend to execute the proposals
* Perform Root source examination
* Apply the arrangements
Remediation errands:


質問 # 29
John wants to send Marie an email that includes sensitive information, and he does not trust the network that he is connected to. Marie gives him the idea of using PGP. What should John do to communicate correctly using this type of encryption?

  • A. Use Marie's public key to encrypt the message.
  • B. Use his own public key to encrypt the message.
  • C. Use Marie's private key to encrypt the message.
  • D. Use his own private key to encrypt the message.

正解:A


質問 # 30
Which of the following tools are used for enumeration? (Choose three.)

  • A. SolarWinds
  • B. SID2USER
  • C. DumpSec
  • D. USER2SID
  • E. Cheops

正解:B、C、D


質問 # 31
You are working as a Security Analyst in a company XYZ that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8.
While monitoring the data, you find a high number of outbound connections. You see that IP's owned by XYZ (Internal) and private IP's are communicating to a Single Public IP. Therefore, the Internal IP's are sending data to the Public IP.
After further analysis, you find out that this Public IP is a blacklisted IP, and the internal communicating devices are compromised.
What kind of attack does the above scenario depict?

  • A. Botnet Attack
  • B. Advanced Persistent Threats
  • C. Rootkit Attack
  • D. Spear Phishing Attack

正解:A


質問 # 32
What is the purpose of a demilitarized zone on a network?

  • A. To contain the network devices you wish to protect
  • B. To provide a place to put the honeypot
  • C. To only provide direct access to the nodes within the DMZ and protect the network behind it
  • D. To scan all traffic coming through the DMZ to the internal network

正解:C


質問 # 33
A DDOS attack is performed at layer 7 to take down web infrastructure. Partial HTTP requests are sent to the web infrastructure or applications. Upon receiving a partial request, the target servers opens multiple connections and keeps waiting for the requests to complete.
Which attack is being described here?

  • A. Slowloris attack
  • B. Desynchronization
  • C. Phlashing
  • D. Session splicing

正解:A

解説:
Explanation
Developed by Robert "RSnake" Hansen, Slowloris is DDoS attack software that permits one computer to require down an internet server. Due the straightforward yet elegant nature of this attack, it requires minimal bandwidth to implement and affects the target server's web server only, with almost no side effects on other services and ports.Slowloris has proven highly-effective against many popular sorts of web server software, including Apache 1.x and 2.x.Over the years, Slowloris has been credited with variety of high-profile server takedowns. Notably, it had been used extensively by Iranian 'hackivists' following the 2009 Iranian presidential election to attack Iranian government internet sites .Slowloris works by opening multiple connections to the targeted web server and keeping them open as long as possible. It does this by continuously sending partial HTTP requests, none of which are ever completed. The attacked servers open more and connections open, expecting each of the attack requests to be completed.Periodically, the Slowloris sends subsequent HTTP headers for every request, but never actually completes the request. Ultimately, the targeted server's maximum concurrent connection pool is filled, and extra (legitimate) connection attempts are denied.By sending partial, as against malformed, packets, Slowloris can easily elapse traditional Intrusion Detection systems.Named after a kind of slow-moving Asian primate, Slowloris really does win the race by moving slowly and steadily. A Slowloris attack must await sockets to be released by legitimate requests before consuming them one by one.For a high-volume internet site , this will take a while . the method are often further slowed if legitimate sessions are reinitiated. But within the end, if the attack is unmitigated, Slowloris-like the tortoise-wins the race.If undetected or unmitigated, Slowloris attacks also can last for long periods of your time . When attacked sockets outing , Slowloris simply reinitiates the connections, continuing to reach the online server until mitigated.Designed for stealth also as efficacy, Slowloris are often modified to send different host headers within the event that a virtual host is targeted, and logs are stored separately for every virtual host.More importantly, within the course of an attack, Slowloris are often set to suppress log file creation. this suggests the attack can catch unmonitored servers off-guard, with none red flags appearing in log file entries.Methods of mitigationImperva's security services are enabled by reverse proxy technology, used for inspection of all incoming requests on their thanks to the clients' servers.Imperva's secured proxy won't forward any partial connection requests-rendering all Slowloris DDoS attack attempts completely and utterly useless.


質問 # 34
Internet Protocol Security IPsec is actually a suite pf protocols. Each protocol within the suite provides different functionality. Collective IPsec does everything except.

  • A. Protect the payload and the headers
  • B. Encrypt
  • C. Work at the Data Link Layer
  • D. Authenticate

正解:D


質問 # 35
in this form of encryption algorithm, every Individual block contains 64-bit data, and three keys are used, where each key consists of 56 bits. Which is this encryption algorithm?

  • A. Triple Data Encryption standard
  • B. AES
  • C. MDS encryption algorithm
  • D. IDEA

正解:A

解説:
Explanation
Triple DES is another mode of DES operation. It takes three 64-bit keys, for an overall key length of 192 bits.
In Stealth, you merely type within the entire 192-bit (24 character) key instead of entering each of the three keys individually. The Triple DES DLL then breaks the user-provided key into three subkeys, padding the keys if necessary in order that they are each 64 bits long. The procedure for encryption is strictly an equivalent as regular DES, but it's repeated 3 times , hence the name Triple DES. the info is encrypted with the primary key, decrypted with the second key, and eventually encrypted again with the third key.Triple DES runs 3 times slower than DES, but is far safer if used properly. The procedure for decrypting something is that the same because the procedure for encryption, except it's executed in reverse. Like DES, data is encrypted and decrypted in 64-bit chunks. Although the input key for DES is 64 bits long, the particular key employed by DES is merely 56 bits long . the smallest amount significant (right-most) bit in each byte may be a parity , and will be set in order that there are always an odd number of 1s in every byte. These parity bits are ignored, so only the seven most vital bits of every byte are used, leading to a key length of 56 bits. this suggests that the effective key strength for Triple DES is really 168 bits because each of the three keys contains 8 parity bits that aren't used during the encryption process.Triple DES ModesTriple ECB (Electronic Code Book)* This variant of Triple DES works precisely the same way because the ECB mode of DES.* this is often the foremost commonly used mode of operation.Triple CBC (Cipher Block Chaining)* This method is extremely almost like the quality DES CBC mode.* like Triple ECB, the effective key length is 168 bits and keys are utilized in an equivalent manner, as described above, but the chaining features of CBC mode also are employed.* the primary 64-bit key acts because the Initialization Vector to DES.* Triple ECB is then executed for one 64-bit block of plaintext.* The resulting ciphertext is then XORed with subsequent plaintext block to be encrypted, and therefore the procedure is repeated.* This method adds an additional layer of security to Triple DES and is therefore safer than Triple ECB, although it's not used as widely as Triple ECB.


質問 # 36
John the Ripper is a technical assessment tool used to test the weakness of which of the following?

  • A. File permissions
  • B. Firewall rulesets
  • C. Usernames
  • D. Passwords

正解:D


質問 # 37
Dorian is sending a digitally signed email to Poly. With which key is Dorian signing this message and how is Poly validating it?

  • A. Dorian is signing the message with his private key, and Poly will verify that the message came from Dorian by using Dorian's public key.
  • B. Dorian is signing the message with Poly's public key, and Poly will verify that the message came from Dorian by using Dorian's public key.
  • C. Dorian is signing the message with his public key, and Poly will verify that the message came from Dorian by using Dorian's private key.
  • D. Dorian is signing the message with Poly's private key, and Poly will verify that the message came from Dorian by using Dorian's public key.

正解:A


質問 # 38
Steven connected his iPhone to a public computer that had been infected by Clark, an attacker. After establishing the connection with the public computer, Steven enabled iTunes Wi-Fi sync on the computer so that the device could continue communication with that computer even after being physically disconnected.
Now, Clark gains access to Steven's iPhone through the infected computer and is able to monitor and read all of Steven's activity on the iPhone, even after the device is out of the communication zone.
Which of the following attacks is performed by Clark in the above scenario?

  • A. iOS trustjacking
  • B. Exploiting SS7 vulnerability
  • C. Man-in-the-disk attack
  • D. iOS jailbreaking

正解:A


質問 # 39
Security administrator John Smith has noticed abnormal amounts of traffic coming from local computers at night. Upon reviewing, he finds that user data have been exfiltrated by an attacker. AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any non-whitelisted programs.
What type of malware did the attacker use to bypass the company's application whitelisting?

  • A. File-less malware
  • B. Logic bomb malware
  • C. Phishing malware
  • D. Zero-day malware

正解:A


質問 # 40
Which of the following antennas is commonly used in communications for a frequency band of 10 MHz to VHF and UHF?

  • A. Yagi antenna
  • B. Dipole antenna
  • C. Parabolic grid antenna
  • D. Omnidirectional antenna

正解:A


質問 # 41
Mary found a high vulnerability during a vulnerability scan and notified her server team. After analysis, they sent her proof that a fix to that issue had already been applied. The vulnerability that Marry found is called what?

  • A. False-positive
  • B. False-negative
  • C. Backdoor
  • D. Brute force attack

正解:A


質問 # 42
Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?

  • A. 137 and 443
  • B. 139 and 443
  • C. 139 and 445
  • D. 137 and 139

正解:C


質問 # 43
......

2023年最新の実際にある検証済みの312-50v11問題集:https://www.jpntest.com/shiken/312-50v11-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡