Q: 11
What kind of detection techniques is being used in antivirus software that identifies malware by
collecting data from multiple protected systems and instead of analyzing files locally it’s made on the
provider’s environment?
Options
Discussion
D makes more sense here. The question specifically mentions analyzing files on the provider's environment and using data from multiple endpoints, which is exactly what cloud-based antivirus does. Behavioral and heuristics are usually local analysis. Pretty sure this is what they want, unless I'm missing a trick in the wording.
Probably D
D imo, this matches what I saw in official guide and some practice tests.
Be respectful. No spam.
Q: 12
George is a security professional working for iTech Solutions. He was tasked with securely
transferring sensitive data of the organization between industrial systems. In this process, he used a
short-range communication protocol based on the IEEE 203.15.4 standard. This protocol is used in
devices that transfer data infrequently at a low rate in a restricted area, within a range of 10-100 m.
What is the short-range wireless communication technology George employed in the above
scenario?
Options
Discussion
C imo, saw something like this in a practice set and IEEE 802.15.4 always points to Zigbee. Not totally sure if LPWAN could fit too, but C should be safest.
Be respectful. No spam.
Q: 13
You are an ethical hacker contracted to conduct a security audit for a company. During the audit, you
discover that the company's wireless network is using WEP encryption. You understand the
vulnerabilities associated with WEP and plan to recommend a more secure encryption method.
Which of the following would you recommend as a Suitable replacement to enhance the security of
the company's wireless network?
Options
Discussion
I'd go with B, since WPA2-PSK with AES is the standard secure upgrade over WEP. The official study guide for CEH definitely emphasizes moving away from WEP to WPA2 or better. Anyone see any recent practice questions pushing for anything else?
So tired of seeing vendors ask about WEP like it's still 2005. Definitely B.
Be respectful. No spam.
Q: 14
You just set up a security system in your network. In what kind of system would you find the
following string of characters used as a rule within its configuration? alert tcp any any ->
192.168.100.0/24 21 (msg: ““FTP on the network!””;)
Options
Discussion
D. Had something like this in a mock and it was definitely IDS syntax, not firewall or router. Pretty sure it's D.
I get that some folks might confuse this with a firewall rule, but the alert tcp ... msg part is pure IDS stuff. Firewalls don't use 'alert' or msg options like that. Seems obvious for D, unless I'm missing a weird trick in iptables config?
D imo. The alert tcp any any -> part is classic Snort/Suricata IDS rule syntax. Firewalls (A/C) use different formats, and option B doesn’t make sense for an FTP server rule. I think some mix this up with iptables but that never uses the 'alert' action or this msg format. Correct me if I’m missing something though.
Be respectful. No spam.
Q: 15
User A is writing a sensitive email message to user B outside the local network. User A has chosen to
use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of
the OSI layer does the encryption and decryption of the message take place?
Options
Discussion
I don’t think it’s D. A is more likely because the actual email encryption usually happens at the application layer (think S/MIME or PGP in email clients). Pretty sure Presentation does encoding, but not app-level security.
D
Be respectful. No spam.
Q: 16
Matthew, a black hat, has managed to open a meterpreter session to one of the kiosk machines in
Evil Corp’s lobby. He checks his current SID, which is S-1-5-21-1223352397-1872883824-861252104-
501. What needs to happen before Matthew has full administrator access?
Options
Discussion
Seriously, EC-Council and their trick SIDs again. A
Option D this whole SID thing gets confusing, but 501 should mean admin right?
Be respectful. No spam.
Q: 17
Which of the following is a low-tech way of gaining unauthorized access to systems?
Options
Discussion
A tbh, social engineering is the classic low-tech route since it just relies on tricking people. Love how clear the options are on this one, makes studying easier.
Be respectful. No spam.
Q: 18
When analyzing the IDS logs, the system administrator noticed an alert was logged when the
external router was accessed from the administrator’s Computer to update the router configuration.
What type of an alert is this?
Options
Discussion
C? If the IDS detected it, isn't that a true positive since it saw the activity?
D . Normal admin access got flagged, feels like false positive to me. Can someone confirm if that's what others picked?
Be respectful. No spam.
Q: 19
Which of these is capable of searching for and locating rogue access points?
Options
Discussion
I thought B (WISS) since it sounds close to wireless, but now I’m unsure. Is the question specifically asking for active prevention or just detection? That would make a difference here.
C tbh
Be respectful. No spam.
Q: 20
A large e-commerce organization is planning to implement a vulnerability assessment solution to
enhance its security posture. They require a solution that imitates the outside view of attackers,
performs well-organized inference-based testing, scans automatically against continuously updated
databases, and supports multiple networks. Given these requirements, which type of vulnerability
assessment solution would be most appropriate?
Options
Discussion
B or maybe D but B fits better. Service-based providers usually handle updated scans across networks and simulate outside attacks. Not totally sure though, since product-based can also scan, but doesn't always cover all the points here.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2