Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 10 out of 14 pages
Viewing questions 181-200 out of questions
Questions # 181:

What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?

Options:

A.

Blind Port Scanning


B.

Idle Scanning


C.

Bounce Scanning


D.

Stealth Scanning


E.

UDP Scanning


Expert Solution
Questions # 182:

You have initiated an active operating system fingerprinting attempt with nmap against a target system:

Question # 182

What operating system is the target host running based on the open ports shown above?

Options:

A.

Windows XP


B.

Windows 98 SE


C.

Windows NT4 Server


D.

Windows 2000 Server


Expert Solution
Questions # 183:

Which of the following activities will NOT be considered as passive footprinting?

Options:

A.

Go through the rubbish to find out any information that might have been discarded.


B.

Search on financial site such as Yahoo Financial to identify assets.


C.

Scan the range of IP address found in the target DNS database.


D.

Perform multiples queries using a search engine.


Expert Solution
Questions # 184:

You are scanning into the target network for the first time. You find very few conventional ports open. When you attempt to perform traditional service identification by connecting to the open ports, it yields either unreliable or no results. You are unsure of which protocols are being used. You need to discover as many different protocols as possible.

Which kind of scan would you use to achieve this? (Choose the best answer)

Options:

A.

Nessus scan with TCP based pings.


B.

Nmap scan with the –sP (Ping scan) switch.


C.

Netcat scan with the –u –e switches.


D.

Nmap with the –sO (Raw IP packets) switch.


Expert Solution
Questions # 185:

Paul has just finished setting up his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is only 24Mbps or less. Paul connects to his wireless router's management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop. What is Paul seeing here?

Options:

A.

MAC spoofing


B.

Macof


C.

ARP spoofing


D.

DNS spoofing


Expert Solution
Questions # 186:

An nmap command that includes the host specification of 202.176.56-57.* will scan _______ number of hosts.

Options:

A.

2


B.

256


C.

512


D.

Over 10, 000


Expert Solution
Questions # 187:

What are two types of ICMP code used when using the ping command?

Options:

A.

It uses types 0 and 8.


B.

It uses types 13 and 14.


C.

It uses types 15 and 17.


D.

The ping command does not use ICMP but uses UDP.


Expert Solution
Questions # 188:

A person approaches a network administrator and wants advice on how to send encrypted email from home. The end user does not want to have to pay for any license fees or manage server services. Which of the following is the most secure encryption protocol that the network administrator should recommend?

Options:

A.

IP Security (IPSEC)


B.

Multipurpose Internet Mail Extensions (MIME)


C.

Pretty Good Privacy (PGP)


D.

Hyper Text Transfer Protocol with Secure Socket Layer (HTTPS)


Expert Solution
Questions # 189:

What type of port scan is shown below?

Question # 189

Options:

A.

Idle Scan


B.

Windows Scan


C.

XMAS Scan


D.

SYN Stealth Scan


Expert Solution
Questions # 190:

You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live systems and after scanning each of them you notice that they all show port 21 in closed state.

What should be the next logical step that should be performed?

Options:

A.

Connect to open ports to discover applications.


B.

Perform a ping sweep to identify any additional systems that might be up.


C.

Perform a SYN scan on port 21 to identify any additional systems that might be up.


D.

Rescan every computer to verify the results.


Expert Solution
Questions # 191:

What is the proper response for a NULL scan if the port is closed?

Options:

A.

SYN


B.

ACK


C.

FIN


D.

PSH


E.

RST


F.

No response


Expert Solution
Questions # 192:

Which of the following Nmap commands would be used to perform a stack fingerprinting?

Options:

A.

Nmap -O -p80


B.

Nmap -hU -Q


C.

Nmap -sT -p


D.

Nmap -u -o -w2


E.

Nmap -sS -0p target


Expert Solution
Questions # 193:

What is the following command used for?

net use \targetipc$ "" /u:""

Options:

A.

Grabbing the etc/passwd file


B.

Grabbing the SAM


C.

Connecting to a Linux computer through Samba.


D.

This command is used to connect as a null session


E.

Enumeration of Cisco routers


Expert Solution
Questions # 194:

While footprinting a network, what port/service should you look for to attempt a zone transfer?

Options:

A.

53 UDP


B.

53 TCP


C.

25 UDP


D.

25 TCP


E.

161 UDP


F.

22 TCP


G.

60 TCP


Expert Solution
Questions # 195:

What are the default passwords used by SNMP? (Choose two.)

Options:

A.

Password


B.

SA


C.

Private


D.

Administrator


E.

Public


F.

Blank


Expert Solution
Questions # 196:

Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic?

Options:

A.

Network aliasing


B.

Domain Name Server (DNS) poisoning


C.

Reverse Address Resolution Protocol (ARP)


D.

Port scanning


Expert Solution
Questions # 197:

Which Windows system tool checks integrity of critical files that has been digitally signed by Microsoft?

Options:

A.

signverif.exe


B.

sigverif.exe


C.

msverif.exe


D.

verifier.exe


Expert Solution
Questions # 198:

Which of the following ICMP message types are used for destinations unreachables?

Options:

A.

0


B.

3


C.

11


D.

13


E.

17


Expert Solution
Questions # 199:

What information should an IT system analysis provide to the risk assessor?

Options:

A.

Management buy-in


B.

Threat statement


C.

Security architecture


D.

Impact analysis


Expert Solution
Questions # 200:

An attacker uses a communication channel within an operating system that is neither designed nor intended to transfer information. What is the name of the communications channel?

Options:

A.

Classified


B.

Overt


C.

Encrypted


D.

Covert


Expert Solution
Viewing page 10 out of 14 pages
Viewing questions 181-200 out of questions