Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 13 out of 14 pages
Viewing questions 241-260 out of questions
Questions # 241:

Attackers send an ACK probe packet with random sequence number, no response means port is filtered (Stateful firewall is present) and RST response means the port is not filtered. What type of Port Scanning is this?

Options:

A.

RST flag scanning


B.

FIN flag scanning


C.

SYN flag scanning


D.

ACK flag scanning


Expert Solution
Questions # 242:

Lee is using Wireshark to log traffic on his network. He notices a number of packets being directed to an internal IP from an outside IP where the packets are ICMP and their size is around 65, 536 bytes. What is Lee seeing here?

Options:

A.

Lee is seeing activity indicative of a Smurf attack.


B.

Most likely, the ICMP packets are being sent in this manner to attempt IP spoofing.


C.

Lee is seeing a Ping of death attack.


D.

This is not unusual traffic, ICMP packets can be of any size.


Expert Solution
Questions # 243:

What techniques would you use to evade IDS during a Port Scan? (Select 4 answers)

Options:

A.

Use fragmented IP packets


B.

Spoof your IP address when launching attacks and sniff responses from the server


C.

Overload the IDS with Junk traffic to mask your scan


D.

Use source routing (if possible)


E.

Connect to proxy servers or compromised Trojaned machines to launch attacks


Expert Solution
Questions # 244:

TCP packets transmitted in either direction after the initial three-way handshake will have which of the following bit set?

Options:

A.

SYN flag


B.

ACK flag


C.

FIN flag


D.

XMAS flag


Expert Solution
Questions # 245:

Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?

Options:

A.

Image Hide


B.

Snow


C.

Gif-It-Up


D.

NiceText


Expert Solution
Questions # 246:

Switches maintain a CAM Table that maps individual MAC addresses on the network to physical ports on the switch.

Question # 246

In MAC flooding attack, a switch is fed with many Ethernet frames, each containing different source MAC addresses, by the attacker. Switches have a limited memory for mapping various MAC addresses to physical ports. What happens when the CAM table becomes full?

Options:

A.

Switch then acts as hub by broadcasting packets to all machines on the network


B.

The CAM overflow table will cause the switch to crash causing Denial of Service


C.

The switch replaces outgoing frame switch factory default MAC address of FF:FF:FF:FF:FF:FF


D.

Every packet is dropped and the switch sends out SNMP alerts to the IDS port


Expert Solution
Questions # 247:

Your company has blocked all the ports via external firewall and only allows port 80/443 to connect to the Internet. You want to use FTP to connect to some remote server on the Internet. How would you accomplish this?

Options:

A.

Use HTTP Tunneling


B.

Use Proxy Chaining


C.

Use TOR Network


D.

Use Reverse Chaining


Expert Solution
Questions # 248:

Michael is a junior security analyst working for the National Security Agency (NSA) working primarily on breaking terrorist encrypted messages. The NSA has a number of methods they use to decipher encrypted messages including Government Access to Keys (GAK) and inside informants. The NSA holds secret backdoor keys to many of the encryption algorithms used on the Internet. The problem for the NSA, and Michael, is that terrorist organizations are starting to use custom-built algorithms or obscure algorithms purchased from corrupt governments. For this reason, Michael and other security analysts like him have been forced to find different methods of deciphering terrorist messages. One method that Michael thought of using was to hide malicious code inside seemingly harmless programs. Michael first monitors sites and bulletin boards used by known terrorists, and then he is able to glean email addresses to some of these suspected terrorists. Michael then inserts a stealth keylogger into a mapping program file readme.txt and then sends that as an attachment to the terrorist. This keylogger takes screenshots every 2 minutes and also logs all keyboard activity into a hidden file on the terrorist's computer. Then, the keylogger emails those files to Michael twice a day with a built in SMTP server. What technique has Michael used to disguise this keylogging software?

Options:

A.

Steganography


B.

Wrapping


C.

ADS


D.

Hidden Channels


Expert Solution
Questions # 249:

Within the context of Computer Security, which of the following statements describes Social Engineering best?

Options:

A.

Social Engineering is the act of publicly disclosing information


B.

Social Engineering is the means put in place by human resource to perform time accounting


C.

Social Engineering is the act of getting needed information from a person rather than breaking into a system


D.

Social Engineering is a training program within sociology studies


Expert Solution
Questions # 250:

You establish a new Web browser connection to Google. Since a 3-way handshake is required for any TCP connection, the following actions will take place.

Question # 250

    DNS query is sent to the DNS server to resolve www.google.com

    DNS server replies with the IP address for Google?

    SYN packet is sent to Google.

    Google sends back a SYN/ACK packet

    Your computer completes the handshake by sending an ACK

    The connection is established and the transfer of data commences

Which of the following packets represent completion of the 3-way handshake?

Options:

A.

4th packet


B.

3rdpacket


C.

6th packet


D.

5th packet


Expert Solution
Questions # 251:

Harold works for Jacobson Unlimited in the IT department as the security manager. Harold has created a security policy requiring all employees to use complex 14 character passwords. Unfortunately, the members of management do not want to have to use such long complicated passwords so they tell Harold's boss this new password policy should not apply to them. To comply with the management's wishes, the IT department creates another Windows domain and moves all the management users to that domain. This new domain has a password policy only requiring 8 characters.

Harold is concerned about having to accommodate the managers, but cannot do anything about it. Harold is also concerned about using LanManager security on his network instead of NTLM or NTLMv2, but the many legacy applications on the network prevent using the more secure NTLM and NTLMv2. Harold pulls the SAM files from the DC's on the original domain and the new domain using Pwdump6.

Harold uses the password cracking software John the Ripper to crack users' passwords to make sure they are strong enough. Harold expects that the users' passwords in the original domain will take much longer to crack than the management's passwords in the new domain. After running the software, Harold discovers that the 14 character passwords only took a short time longer to crack than the 8 character passwords.

Why did the 14 character passwords not take much longer to crack than the 8 character passwords?

Options:

A.

Harold should have used Dumpsec instead of Pwdump6


B.

Harold's dictionary file was not large enough


C.

Harold should use LC4 instead of John the Ripper


D.

LanManger hashes are broken up into two 7 character fields


Expert Solution
Questions # 252:

Leesa is the senior security analyst for a publicly traded company. The IT department recently rolled out an intranet for company use only with information ranging from training, to holiday schedules, to human resources data. Leesa wants to make sure the site is not accessible from outside and she also wants to ensure the site is Sarbanes-Oxley (SOX) compliant. Leesa goes to a public library as she wants to do some Google searching to verify whether the company's intranet is accessible from outside and has been indexed by Google. Leesa wants to search for a website title of "intranet" with part of the URL containing the word "intranet" and the words "human resources" somewhere in the webpage.

What Google search will accomplish this?

Options:

A.

related:intranet allinurl:intranet:"human resources"


B.

cache:"human resources" inurl:intranet(SharePoint)


C.

intitle:intranet inurl:intranet+intext:"human resources"


D.

site:"human resources"+intext:intranet intitle:intranet


Expert Solution
Questions # 253:

This method is used to determine the Operating system and version running on a remote target system. What is it called?

Options:

A.

Service Degradation


B.

OS Fingerprinting


C.

Manual Target System


D.

Identification Scanning


Expert Solution
Questions # 254:

Blane is a network security analyst for his company. From an outside IP, Blane performs an XMAS scan using Nmap. Almost every port scanned does not illicit a response. What can he infer from this kind of response?

Options:

A.

These ports are open because they do not illicit a response.


B.

He can tell that these ports are in stealth mode.


C.

If a port does not respond to an XMAS scan using NMAP, that port is closed.


D.

The scan was not performed correctly using NMAP since all ports, no matter what their state, will illicit some sort of response from an XMAS scan.


Expert Solution
Questions # 255:

NetBIOS over TCP/IP allows files and/or printers to be shared over the network. You are trying to intercept the traffic from a victim machine to a corporate network printer. You are attempting to hijack the printer network connection from your laptop by sniffing the wire. Which port does SMB over TCP/IP use?

Options:

A.

443


B.

139


C.

179


D.

445


Expert Solution
Questions # 256:

What port number is used by LDAP protocol?

Options:

A.

110


B.

389


C.

464


D.

445


Expert Solution
Questions # 257:

You are gathering competitive intelligence on an organization. You notice that they have jobs listed on a few Internet job-hunting sites. There are two jobs for network and system administrators. How can this help you in foot printing the organization?

Options:

A.

To learn about the IP range used by the target network


B.

To identify the number of employees working for the company


C.

To test the limits of the corporate security policy enforced in the company


D.

To learn about the operating systems, services and applications used on the network


Expert Solution
Questions # 258:

Bob has been hired to do a web application security test. Bob notices that the site is dynamic and must make use of a back end database. Bob wants to see if SQL Injection would be possible. What is the first character that Bob should use to attempt breaking valid SQL request?

Options:

A.

Semi Column


B.

Double Quote


C.

Single Quote


D.

Exclamation Mark


Expert Solution
Questions # 259:

What framework architecture is shown in this exhibit?

Question # 259

Options:

A.

Core Impact


B.

Metasploit


C.

Immunity Canvas


D.

Nessus


Expert Solution
Questions # 260:

The programmers on your team are analyzing the free, open source software being used to run FTP services on a server in your organization. They notice that there is excessive number of functions in the source code that might lead to buffer overflow. These C++ functions do not check bounds. Identify the line in the source code that might lead to buffer overflow?

Question # 260

Options:

A.

9A.9


B.

17B.17


C.

20C.20


D.

32D.32


E.

35E.35


Expert Solution
Viewing page 13 out of 14 pages
Viewing questions 241-260 out of questions