Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 101-120 out of questions
Questions # 101:

Ivan is auditing a corporate website. Using Winhex, he alters a cookie as shown below.

Before Alteration: Cookie: lang=en-us; ADMIN=no; y=1 ; time=10:30GMT ;

After Alteration: Cookie: lang=en-us; ADMIN=yes; y=1 ; time=12:30GMT ;

What attack is being depicted here?

Options:

A.

Cookie Stealing


B.

Session Hijacking


C.

Cross Site Scripting


D.

Parameter Manipulation


Expert Solution
Questions # 102:

The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The file Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.

He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below:

Question # 102

What can you infer from the exploit given?

Options:

A.

It is a local exploit where the attacker logs in using username johna2k.


B.

There are two attackers on the system – johna2k and haxedj00.


C.

The attack is a remote exploit and the hacker downloads three files.


D.

The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port.


Expert Solution
Questions # 103:

What is the best means of prevention against viruses?

Options:

A.

Assign read only permission to all files on your system.


B.

Remove any external devices such as floppy and USB connectors.


C.

Install a rootkit detection tool.


D.

Install and update anti-virus scanner.


Expert Solution
Questions # 104:

On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks?

Options:

A.

The SSID is only 32 bits in length.


B.

The SSID is transmitted in clear text.


C.

The SSID is the same as the MAC address for all vendors.


D.

The SSID is to identify a station, not a network.


Expert Solution
Questions # 105:

When working with Windows systems, what is the RID of the true administrator account?

Options:

A.

500


B.

501


C.

1000


D.

1001


E.

1024


F.

512


Expert Solution
Questions # 106:

A program that defends against a port scanner will attempt to:

Options:

A.

Sends back bogus data to the port scanner


B.

Log a violation and recommend use of security-auditing tools


C.

Limit access by the scanning system to publicly available ports only


D.

Update a firewall rule in real time to prevent the port scan from being completed


Expert Solution
Questions # 107:

When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer)

Options:

A.

Cover his tracks by eradicating the log files and audit trails.


B.

Gain access to the remote computer in order to conceal the venue of attacks.


C.

Perform a reconnaissance of the remote target for identical of venue of attacks.


D.

Always begin with a scan in order to quickly identify venue of attacks.


Expert Solution
Questions # 108:

If you come across a sheepdip machine at your client’s site, what should you do?

Options:

A.

A sheepdip computer is used only for virus-checking.


B.

A sheepdip computer is another name for a honeypot


C.

A sheepdip coordinates several honeypots.


D.

A sheepdip computers defers a denial of service attack.


Expert Solution
Questions # 109:

What is a sheepdip?

Options:

A.

It is another name for Honeynet


B.

It is a machine used to coordinate honeynets


C.

It is the process of checking physical media for virus before they are used in a computer


D.

None of the above


Expert Solution
Questions # 110:

To scan a host downstream from a security gateway, Firewalking:

Options:

A.

Sends a UDP-based packet that it knows will be blocked by the firewall to determine how specifically the firewall responds to such packets


B.

Uses the TTL function to send packets with a TTL value set to expire one hop past the identified security gateway


C.

Sends an ICMP ''administratively prohibited'' packet to determine if the gateway will drop the packet without comment.


D.

Assesses the security rules that relate to the target system before it sends packets to any hops on the route to the gateway


Expert Solution
Questions # 111:

Symmetric encryption algorithms are known to be fast but present great challenges on the key management side. Asymmetric encryption algorithms are slow but allow communication with a remote host without having to transfer a key out of band or in person. If we combine the strength of both crypto systems where we use the symmetric algorithm to encrypt the bulk of the data and then use the asymmetric encryption system to encrypt the symmetric key, what would this type of usage be known as?

Options:

A.

Symmetric system


B.

Combined system


C.

Hybrid system


D.

Asymmetric system


Expert Solution
Questions # 112:

What is Cygwin?

Options:

A.

Cygwin is a free C++ compiler that runs on Windows


B.

Cygwin is a free Unix subsystem that runs on top of Windows


C.

Cygwin is a free Windows subsystem that runs on top of Linux


D.

Cygwin is a X Windows GUI subsytem that runs on top of Linux GNOME environment


Expert Solution
Questions # 113:

Which of the following is one of the key features found in a worm but not seen in a virus?

Options:

A.

The payload is very small, usually below 800 bytes.


B.

It is self replicating without need for user intervention.


C.

It does not have the ability to propagate on its own.


D.

All of them cannot be detected by virus scanners.


Expert Solution
Questions # 114:

What type of attack changes its signature and/or payload to avoid detection by antivirus programs?

Options:

A.

Polymorphic


B.

Rootkit


C.

Boot sector


D.

File infecting


Expert Solution
Questions # 115:

What type of cookies can be generated while visiting different web sites on the Internet?

Options:

A.

Permanent and long term cookies.


B.

Session and permanent cookies.


C.

Session and external cookies.


D.

Cookies are all the same, there is no such thing as different type of cookies.


Expert Solution
Questions # 116:

When working with Windows systems, what is the RID of the true administrator account?

Options:

A.

500


B.

501


C.

512


D.

1001


E.

1024


F.

1000


Expert Solution
Questions # 117:

The Slammer Worm exploits a stack-based overflow that occurs in a DLL implementing the Resolution Service.

Which of the following Database Server was targeted by the slammer worm?

Options:

A.

Oracle


B.

MSSQL


C.

MySQL


D.

Sybase


E.

DB2


Expert Solution
Questions # 118:

You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024. What is this process known as?

Options:

A.

Footprinting


B.

Firewalking


C.

Enumeration


D.

Idle scanning


Expert Solution
Questions # 119:

Which of the following statements best describes the term Vulnerability?

Options:

A.

A weakness or error that can lead to a compromise


B.

An agent that has the potential to take advantage of a weakness


C.

An action or event that might prejudice security


D.

The loss potential of a threat.


Expert Solution
Questions # 120:

This kind of attack will let you assume a users identity at a dynamically generated web page or site:

Options:

A.

SQL Injection


B.

Cross Site Scripting


C.

Session Hijacking


D.

Zone Transfer


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 101-120 out of questions