Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 21-40 out of questions
Questions # 21:

Lori is a Certified Ethical Hacker as well as a Certified Hacking Forensics Investigator working as an IT security consultant. Lori has been hired on by Kiley Innovators, a large marketing firm that recently underwent a string of thefts and corporate espionage incidents. Lori is told that a rival marketing company came out with an exact duplicate product right before Kiley Innovators was about to release it. The executive team believes that an employee is leaking information to the rival company. Lori questions all employees, reviews server logs, and firewall logs; after which she finds nothing. Lori is then given permission to search through the corporate email system. She searches by email being sent to and sent from the rival marketing company.

She finds one employee that appears to be sending very large email to this other marketing company, even though they should have no reason to be communicating with them. Lori tracks down the actual emails sent and upon opening them, only finds picture files attached to them. These files seem perfectly harmless, usually containing some kind of joke. Lori decides to use some special software to further examine the pictures and finds that each one had hidden text that was stored in each picture.

What technique was used by the Kiley Innovators employee to send information to the rival marketing company?

Options:

A.

The Kiley Innovators employee used cryptography to hide the information in the emails sent


B.

The method used by the employee to hide the information was logical watermarking


C.

The employee used steganography to hide information in the picture attachments


D.

By using the pictures to hide information, the employee utilized picture fuzzing


Expert Solution
Questions # 22:

What does ICMP (type 11, code 0) denote?

Options:

A.

Source Quench


B.

Destination Unreachable


C.

Time Exceeded


D.

Unknown Type


Expert Solution
Questions # 23:

Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?

Options:

A.

Issue special cards to access secure doors at the company and provide a one-time only brief description of use of the special card


B.

Educate and enforce physical security policies of the company to all the employees on a regular basis


C.

Setup a mock video camera next to the special card reader adjacent to the secure door


D.

Post a sign that states, "no tailgating" next to the special card reader adjacent to the secure door


Expert Solution
Questions # 24:

While performing a ping sweep of a local subnet you receive an ICMP reply of Code 3/Type 13 for all the pings you have sent out. What is the most likely cause of this?

Options:

A.

The firewall is dropping the packets


B.

An in-line IDS is dropping the packets


C.

A router is blocking ICMP


D.

The host does not respond to ICMP packets


Expert Solution
Questions # 25:

The following script shows a simple SQL injection. The script builds an SQL query by concatenating hard-coded strings together with a string entered by the user:

Question # 25

The user is prompted to enter the name of a city on a Web form. If she enters Chicago, the query assembled by the script looks similar to the following:

SELECT * FROM OrdersTable WHERE ShipCity = 'Chicago'

How will you delete the OrdersTable from the database using SQL Injection?

Options:

A.

Chicago'; drop table OrdersTable --


B.

Delete table'blah'; OrdersTable --


C.

EXEC; SELECT * OrdersTable > DROP --


D.

cmdshell'; 'del c:\sql\mydb\OrdersTable' //


Expert Solution
Questions # 26:

Bret is a web application administrator and has just read that there are a number of surprisingly common web application vulnerabilities that can be exploited by unsophisticated attackers with easily available tools on the Internet. He has also read that when an organization deploys a web application, they invite the world to send HTTP requests. Attacks buried in these requests sail past firewalls, filters, platform hardening, SSL, and IDS without notice because they are inside legal HTTP requests. Bret is determined to weed out vulnerabilities.

What are some of the common vulnerabilities in web applications that he should be concerned about?

Options:

A.

Non-validated parameters, broken access control, broken account and session management, cross-site scripting and buffer overflows are just a few common vulnerabilities


B.

Visible clear text passwords, anonymous user account set as default, missing latest security patch, no firewall filters set and no SSL configured are just a few common vulnerabilities


C.

No SSL configured, anonymous user account set as default, missing latest security patch, no firewall filters set and an inattentive system administrator are just a few common vulnerabilities


D.

No IDS configured, anonymous user account set as default, missing latest security patch, no firewall filters set and visible clear text passwords are just a few common vulnerabilities


Expert Solution
Questions # 27:

You receive an e-mail with the following text message.

"Microsoft and HP today warned all customers that a new, highly dangerous virus has been discovered which will erase all your files at midnight. If there's a file called hidserv.exe on your computer, you have been infected and your computer is now running a hidden server that allows hackers to access your computer. Delete the file immediately. Please also pass this message to all your friends and colleagues as soon as possible."

You launch your antivirus software and scan the suspicious looking file hidserv.exe located in c:\windows directory and the AV comes out clean meaning the file is not infected. You view the file signature and confirm that it is a legitimate Windows system file "Human Interface Device Service".

What category of virus is this?

Options:

A.

Virus hoax


B.

Spooky Virus


C.

Stealth Virus


D.

Polymorphic Virus


Expert Solution
Questions # 28:

How many bits encryption does SHA-1 use?

Options:

A.

64 bits


B.

128 bits


C.

256 bits


D.

160 bits


Expert Solution
Questions # 29:

Cyber Criminals have long employed the tactic of masking their true identity. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine, by "spoofing" the IP address of that machine.

How would you detect IP spoofing?

Options:

A.

Check the IPID of the spoofed packet and compare it with TLC checksum. If the numbers match then it is spoofed packet


B.

Probe a SYN Scan on the claimed host and look for a response SYN/FIN packet, if the connection completes then it is a spoofed packet


C.

Turn on 'Enable Spoofed IP Detection' in Wireshark, you will see a flag tick if the packet is spoofed


D.

Sending a packet to the claimed host will result in a reply. If the TTL in the reply is not the same as the packet being checked then it is a spoofed packet


Expert Solution
Questions # 30:

How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time with the purpose of defeating simple pattern matching in IDS systems without session reconstruction? A characteristic of this attack would be a continuous stream of small packets.

Options:

A.

Session Hijacking


B.

Session Stealing


C.

Session Splicing


D.

Session Fragmentation


Expert Solution
Questions # 31:

Jayden is a network administrator for her company. Jayden wants to prevent MAC spoofing on all the Cisco switches in the network. How can she accomplish this?

Options:

A.

Jayden can use the commanD. ip binding set.


B.

Jayden can use the commanD. no ip spoofing.


C.

She should use the commanD. no dhcp spoofing.


D.

She can use the commanD. ip dhcp snooping binding.


Expert Solution
Questions # 32:

A common technique for luring e-mail users into opening virus-launching attachments is to send messages that would appear to be relevant or important to many of their potential recipients. One way of accomplishing this feat is to make the virus-carrying messages appear to come from some type of business entity retailing sites, UPS, FEDEX, CITIBANK or a major provider of a common service.

Here is a fraudulent e-mail claiming to be from FedEx regarding a package that could not be delivered. This mail asks the receiver to open an attachment in order to obtain the FEDEX tracking number for picking up the package. The attachment contained in this type of e-mail activates a virus.

Question # 32

Vendors send e-mails like this to their customers advising them not to open any files attached with the mail, as they do not include attachments.

Fraudulent e-mail and legit e-mail that arrives in your inbox contain the fedex.com as the sender of the mail.

How do you ensure if the e-mail is authentic and sent from fedex.com?

Options:

A.

Verify the digital signature attached with the mail, the fake mail will not have Digital ID at all


B.

Check the Sender ID against the National Spam Database (NSD)


C.

Fake mail will have spelling/grammatical errors


D.

Fake mail uses extensive images, animation and flash content


Expert Solution
Questions # 33:

What is War Dialing?

Options:

A.

War dialing involves the use of a program in conjunction with a modem to penetrate the modem/PBX-based systems


B.

War dialing is a vulnerability scanning technique that penetrates Firewalls


C.

It is a social engineering technique that uses Phone calls to trick victims


D.

Involves IDS Scanning Fragments to bypass Internet filters and stateful Firewalls


Expert Solution
Questions # 34:

Windows LAN Manager (LM) hashes are known to be weak. Which of the following are known weaknesses of LM? (Choose three)

Options:

A.

Converts passwords to uppercase.


B.

Hashes are sent in clear text over the network.


C.

Makes use of only 32 bit encryption.


D.

Effective length is 7 characters.


Expert Solution
Questions # 35:

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

Options:

A.

Copy the system files from a known good system


B.

Perform a trap and trace


C.

Delete the files and try to determine the source


D.

Reload from a previous backup


E.

Reload from known good media


Expert Solution
Questions # 36:

Fingerprinting an Operating System helps a cracker because:

Options:

A.

It defines exactly what software you have installed


B.

It opens a security-delayed window based on the port being scanned


C.

It doesn't depend on the patches that have been applied to fix existing security holes


D.

It informs the cracker of which vulnerabilities he may be able to exploit on your system


Expert Solution
Questions # 37:

Erik notices a big increase in UDP packets sent to port 1026 and 1027 occasionally. He enters the following at the command prompt.

$ nc -l -p 1026 -u -v

In response, he sees the following message.

cell(?(c)????STOPALERT77STOP! WINDOWS REQUIRES IMMEDIATE ATTENTION.

Windows has found 47 Critical Errors.

To fix the errors please do the following:

1. Download Registry Repair from: www.reg-patch.com

2. Install Registry Repair

3. Run Registry Repair

4. Reboot your computer

FAILURE TO ACT NOW MAY LEAD TO DATA LOSS AND CORRUPTION!

What would you infer from this alert?

Options:

A.

The machine is redirecting traffic to www.reg-patch.com using adware


B.

It is a genuine fault of windows registry and the registry needs to be backed up


C.

An attacker has compromised the machine and backdoored ports 1026 and 1027


D.

It is a messenger spam. Windows creates a listener on one of the low dynamic ports from 1026 to 1029 and the message usually promotes malware disguised as legitimate utilities


Expert Solution
Questions # 38:

Which of the following is not considered to be a part of active sniffing?

Options:

A.

MAC Flooding


B.

ARP Spoofing


C.

SMAC Fueling


D.

MAC Duplicating


Expert Solution
Questions # 39:

A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems. However, he is unable to capture any logons though he knows that other users are logging in.

What do you think is the most likely reason behind this?

Options:

A.

There is a NIDS present on that segment.


B.

Kerberos is preventing it.


C.

Windows logons cannot be sniffed.


D.

L0phtcrack only sniffs logons to web servers.


Expert Solution
Questions # 40:

Bob wants to prevent attackers from sniffing his passwords on the wired network. Which of the following lists the best options?

Options:

A.

RSA, LSA, POP


B.

SSID, WEP, Kerberos


C.

SMB, SMTP, Smart card


D.

Kerberos, Smart card, Stanford SRP


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 21-40 out of questions