Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 41-60 out of questions
Questions # 41:

A remote user tries to login to a secure network using Telnet, but accidently types in an invalid user name or password. Which responses would NOT be preferred by an experienced Security Manager? (multiple answer)

Options:

A.

Invalid Username


B.

Invalid Password


C.

Authentication Failure


D.

Login Attempt Failed


E.

Access Denied


Expert Solution
Questions # 42:

What happens during a SYN flood attack?

Options:

A.

TCP connection requests floods a target machine is flooded with randomized source address & ports for the TCP ports.


B.

A TCP SYN packet, which is a connection initiation, is sent to a target machine, giving the target host’s address as both source and destination, and is using the same port on the target host as both source and destination.


C.

A TCP packet is received with the FIN bit set but with no ACK bit set in the flags field.


D.

A TCP packet is received with both the SYN and the FIN bits set in the flags field.


Expert Solution
Questions # 43:

Which of the following is the primary objective of a rootkit?

Options:

A.

It opens a port to provide an unauthorized service


B.

It creates a buffer overflow


C.

It replaces legitimate programs


D.

It provides an undocumented opening in a program


Expert Solution
Questions # 44:

In the following example, which of these is the "exploit"?

Today, Microsoft Corporation released a security notice. It detailed how a person could bring down the Windows 2003 Server operating system, by sending malformed packets to it. They detailed how this malicious process had been automated using basic scripting. Even worse, the new automated method for bringing down the server has already been used to perform denial of service attacks on many large commercial websites.

Select the best answer.

Options:

A.

Microsoft Corporation is the exploit.


B.

The security "hole" in the product is the exploit.


C.

Windows 2003 Server


D.

The exploit is the hacker that would use this vulnerability.


E.

The documented method of how to use the vulnerability to gain unprivileged access.


Expert Solution
Questions # 45:

Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two.

What would you call this attack?

Options:

A.

Interceptor


B.

Man-in-the-middle


C.

ARP Proxy


D.

Poisoning Attack


Expert Solution
Questions # 46:

Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on?

Options:

A.

A sniffing attack


B.

A spoofing attack


C.

A man in the middle attack


D.

A denial of service attack


Expert Solution
Questions # 47:

Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network?

Options:

A.

137 and 139


B.

137 and 443


C.

139 and 443


D.

139 and 445


Expert Solution
Questions # 48:

A POP3 client contacts the POP3 server:

Options:

A.

To send mail


B.

To receive mail


C.

to send and receive mail


D.

to get the address to send mail to


E.

initiate a UDP SMTP connection to read mail


Expert Solution
Questions # 49:

When discussing passwords, what is considered a brute force attack?

Options:

A.

You attempt every single possibility until you exhaust all possible combinations or discover the password


B.

You threaten to use the rubber hose on someone unless they reveal their password


C.

You load a dictionary of words into your cracking program


D.

You create hashes of a large number of words and compare it with the encrypted passwords


E.

You wait until the password expires


Expert Solution
Questions # 50:

Exhibit:

Based on the following extract from the log of a compromised machine, what is the hacker really trying to steal?

Options:

A.

har.txt


B.

SAM file


C.

wwwroot


D.

Repair file


Expert Solution
Questions # 51:

What does the following command in netcat do?

nc -l -u -p55555 < /etc/passwd

Options:

A.

logs the incoming connections to /etc/passwd file


B.

loads the /etc/passwd file to the UDP port 55555


C.

grabs the /etc/passwd file when connected to UDP port 55555


D.

deletes the /etc/passwd file when connected to the UDP port 55555


Expert Solution
Questions # 52:

Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

Options:

A.

Teardrop


B.

Smurf


C.

Ping of Death


D.

SYN flood


E.

SNMP Attack


Expert Solution
Questions # 53:

_____ is the process of converting something from one representation to the simplest form. It deals with the way in which systems convert data from one form to another.

Options:

A.

Canonicalization


B.

Character Mapping


C.

Character Encoding


D.

UCS transformation formats


Expert Solution
Questions # 54:

What is GINA?

Options:

A.

Gateway Interface Network Application


B.

GUI Installed Network Application CLASS


C.

Global Internet National Authority (G-USA)


D.

Graphical Identification and Authentication DLL


Expert Solution
Questions # 55:

Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network. Which of these tools would do the SNMP enumeration he is looking for?

Select the best answers.

Options:

A.

SNMPUtil


B.

SNScan


C.

SNMPScan


D.

Solarwinds IP Network Browser


E.

NMap


Expert Solution
Questions # 56:

Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and forward it so that the server might perform undesirable actions. Alternatively, the attacker could pose as the server or client after a legitimate authentication and gain unauthorized access to data. Which of the following is NOT a means that can be used to minimize or protect against such an attack?

Options:

A.

Timestamps


B.

SMB Signing


C.

File permissions


D.

Sequence numbers monitoring


Expert Solution
Questions # 57:

Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain. What do you think Tess King is trying to accomplish? Select the best answer.

Options:

A.

A zone harvesting


B.

A zone transfer


C.

A zone update


D.

A zone estimate


Expert Solution
Questions # 58:

In Linux, the three most common commands that hackers usually attempt to Trojan are:

Options:

A.

car, xterm, grep


B.

netstat, ps, top


C.

vmware, sed, less


D.

xterm, ps, nc


Expert Solution
Questions # 59:

John wishes to install a new application onto his Windows 2000 server.

He wants to ensure that any application he uses has not been Trojaned.

What can he do to help ensure this?

Options:

A.

Compare the file's MD5 signature with the one published on the distribution media


B.

Obtain the application via SSL


C.

Compare the file's virus signature with the one published on the distribution media


D.

Obtain the application from a CD-ROM disc


Expert Solution
Questions # 60:

Exhibit:

Question # 60

Study the following log extract and identify the attack.

Options:

A.

Hexcode Attack


B.

Cross Site Scripting


C.

Multiple Domain Traversal Attack


D.

Unicode Directory Traversal Attack


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 41-60 out of questions