Ethical Hacking Exam 2024 Correctly Answered
Ethical Hacking Exam 2024 Correctly Answered What two scripts in the WEPCrack toolset are used to imitate IVs and encrypted output seen from an access point, and then to crack the WEP key used by the access point? - Answer -WeakIVG WEPC A client was recently compromised even though their IDS detected an attack. The compromise occurred because there was no one actively monitoring the IDS. What can be done to ensure that the IDS grabs the attention of a system administrator when attacks occur? - Answer -A sound file can be played when an attack is detected, to generate an audible alarm that the administrator must respond to The IDS can send an SNMP trap to the e-mail address of the administrator, or to a management system What part of a cell phone jammer transmits the radio signals used to block cell traffic? - Answer -voltagecontrolled oscillator What does the "++" line in a user's .rhosts file do? - Answer -It allows anyone to log into the system using that user's ID without a password A client has approached you with what they believe is a compromised Mac OS X machine. Upon investigating the machine's filesystem, you uncover several odd files in the /tmp directory. Specifically, you find /tmp/ and /tmp/pic. What infection does the OS X computer have? - Answer - OSX/Leap-A worm Public-key cryptography is an example of what type of encryption? - Answer -asymmetric encryption You are attempting to penetrate a client's network by gaining physical access to their server room. Upon finding the room, you discover a door that doesn't appear to have a corresponding strike plate on the door knob side, and it doesn't appear to be using a tumbler lock, despite having a keyed entry. Through the thick security glass next to the door, a visible rack system with a glass panel shows a reflection of the other side of the door. The top of the door appears to have an electric junction box just above the frame portion of the door. What type of lock is most likely being used? - Answer -An electromagnetic lock that requires a key to interrupt current to the magnet at the top of the door What statement accurately describes the Blowfish secret-key cryptographic method? - Answer -It uses a variable key length of 32 to 448 bits and utilizes a block cipher that organizes data into chunks of 64-bits before encrypting them
Written for
- Institution
- Ethical Hacking
- Course
- Ethical Hacking
Document information
- Uploaded on
- May 19, 2024
- Number of pages
- 12
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- ethical hacking exam 2024
- ethical hacking exam 2025
-
what two scripts in the wepcrack toolset are used
Also available in package deal