New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Certified Ethical Hacker 312-50 Passing Score

Page: 14 / 17
Question 56

A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.

Which cryptography attack is the student attempting?

Options:

A.

Man-in-the-middle attack

B.

Brute-force attack

C.

Dictionary attack

D.

Session hijacking

Question 57

During a penetration test, a tester finds a target that is running MS SQL 2000 with default credentials. The tester assumes that the service is running with Local System account. How can this weakness be exploited to access the system?

Options:

A.

Using the Metasploit psexec module setting the SA / Admin credential

B.

Invoking the stored procedure xp_shell to spawn a Windows command shell

C.

Invoking the stored procedure cmd_shell to spawn a Windows command shell

D.

Invoking the stored procedure xp_cmdshell to spawn a Windows command shell

Question 58

A security policy will be more accepted by employees if it is consistent and has the support of

Options:

A.

coworkers.

B.

executive management.

C.

the security officer.

D.

a supervisor.

Question 59

Which of the following is a symmetric cryptographic standard?

Options:

A.

DSA

B.

PKI

C.

RSA

D.

3DES

Page: 14 / 17
Exam Code: 312-50
Exam Name: Ethical Hacking and Countermeasures
Last Update: Dec 27, 2024
Questions: 765
312-50 pdf

312-50 PDF

$25.5  $84.99
312-50 Engine

312-50 Testing Engine

$28.5  $94.99
312-50 PDF + Engine

312-50 PDF + Testing Engine

$40.5  $134.99