Certified Ethical Hacker Examination-Questions & Answers- #5

All these Questions are in this Section were asked in Certified Ethical Hacker Examinations of EC-Council .This is the 5th part


1- Which of the following is an example of two factor authentication?

A. PIN Number and Birth Date
B. Username and Password
C. Digital Certificate and Hardware Token
D. Fingerprint and Smartcard ID

Answer: D. Fingerprint and Smartcard ID

2-. Which set of access control solutions implements two-factor authentication?
A. USB token and PIN
B. Fingerprint scanner and retina scanner
C. Password and PIN
D. Account and password

Answer: A. USB token and PIN




Related Link
Cyber Security Ethical Hacker Que & Ans-Part-4
Cyber Security Ethical Hacker Que & Ans-Part-3
Cyber Security Ethical Hacker Que & Ans-Part-2
Cyber Security Ethical Hacker Que & Ans-Part-1

3-. Bob learned that his username and password for a popular game has been compromised. He contacts the company and resets all the information. The company suggests he use two-factor authentication, which option below offers that?
A- A new username and password
B- Disable his username and use just a fingerprint scanner.
C- His username and a stronger password
D- A fingerprint scanner and his username and password

Answer: D- A fingerprint scanner and his username and password

4- Todd has been asked by the security officer to purchase a counter-based authentication system. Which of the following best describes this type of system?
A. A biometric system that bases authentication decisions on behavioral attributes.
B. A biometric system that bases authentication decisions on physical attributes.
C. An authentication system that creates one-time passwords that are encrypted with secret keys
D. An authentication system that uses passphrases that are converted into virtual passwords.

Answer: C. An authentication system that creates one-time passwords that are encrypted with secret keys.


5-. Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this approach to a physical control access. A camera captures people walking and identifies the individuals using Steve’s approach. After that, people must approximate their RFID badges. Both the identifications are required to open the door. In this case, we can say:

Answer: The solution implements the two authentication factors: physical object and physical characteristic

6- Which of the following is optimized for confidential communications, such as bidirectional voice and video?
A. RC4
B. RC5
C. MD4
D. MD5

Answer: A. RC4



7- Which type of scan measures a person’s external features through a digital video camera?
A. Iris scan
B. Retinal scan
C. Facial recognition scan
D. Signature kinetics scan

Answer: C. Facial recognition scan

8-Which type of scan is used on the eye to measure the layer of blood vessels?

A. Facial recognition scan
B. Retinal scan
C. Iris scan
D. Signature kinetics scan

Answer: B. Retinal scan

9- What is the main reason the use of a stored biometric is vulnerable to an attack?
A. The digital representation of the biometric might not be unique, even if the physical characteristic is unique.
B. Authentication using a stored biometric compares a copy to a copy instead of the original to a copy.
C. A stored biometric is no longer “something you are” and instead becomes “something you have”
D. A stored biometric can be stolen and used by an attacker to impersonate the individual identified by the biometric.

Answer: D. A stored biometric can be stolen and used by an attacker to impersonate the individual identified by the biometric

10- What is the best defense against privilege escalation vulnerability?
A. Patch systems regularly and upgrade interactive login privileges at the system administrator level.
B. Run administrator and applications on least privileges and use a content registry for tracking.
C. Run services with least privileged accounts and implement multi-factor authentication and authorization.
D. Review user roles and administrator privileges for maximum utilization of automation services.

Answer: B. Run administrator and applications on least privileges and use a content registry for tracking.





Related Link ,See once

SECURITY TOOLS -Cyber Security # 4
Security Tips – Cyber Security #3
Method Of Defence – Cyber Security #2
Computer Threats – Cyber Security #1
Cyber Security Introduction
Cyber Security
Science
>>> CONTACT US < <<

Comment Please