Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 141-160 out of questions
Questions # 141:

Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)

Options:

A.

Port Security


B.

IPSec Encryption


C.

Network Admission Control (NAC)


D.

802.1q Port Based Authentication


E.

802.1x Port Based Authentication


F.

Intrusion Detection System (IDS)


Expert Solution
Questions # 142:

To see how some of the hosts on your network react, Winston sends out SYN packets to an IP range. A number of IPs respond with a SYN/ACK response. Before the connection is established he sends RST packets to those hosts to stop the session. Winston has done this to see how his intrusion detection system will log the traffic. What type of scan is Winston attempting here?

Options:

A.

Winston is attempting to find live hosts on your company's network by using an XMAS scan.


B.

He is utilizing a SYN scan to find live hosts that are listening on your network.


C.

This type of scan he is using is called a NULL scan.


D.

He is using a half-open scan to find live hosts on your network.


Expert Solution
Questions # 143:

Low humidity in a data center can cause which of the following problems?

Options:

A.

Heat


B.

Corrosion


C.

Static electricity


D.

Airborne contamination


Expert Solution
Questions # 144:

A hacker, who posed as a heating and air conditioning specialist, was able to install a sniffer program in a switched environment network. Which attack could the hacker use to sniff all of the packets in the network?

Options:

A.

Fraggle


B.

MAC Flood


C.

Smurf


D.

Tear Drop


Expert Solution
Questions # 145:

Blake is in charge of securing all 20 of his company's servers. He has enabled hardware and software firewalls, hardened the operating systems, and disabled all unnecessary services on all the servers. Unfortunately, there is proprietary AS400 emulation software that must run on one of the servers that requires the telnet service to function properly. Blake is especially concerned about this since telnet can be a very large security risk in an organization. Blake is concerned about how this particular server might look to an outside attacker so he decides to perform some footprinting, scanning, and penetration tests on the server. Blake telnets into the server using Port 80 and types in the following command:

HEAD / HTTP/1.0

After pressing enter twice, Blake gets the following results: What has Blake just accomplished?

Question # 145

Options:

A.

Downloaded a file to his local computer


B.

Submitted a remote command to crash the server


C.

Poisoned the local DNS cache of the server


D.

Grabbed the Operating System banner


Expert Solution
Questions # 146:

In the software security development life cyle process, threat modeling occurs in which phase?

Options:

A.

Design


B.

Requirements


C.

Verification


D.

Implementation


Expert Solution
Questions # 147:

During a penetration test, the tester conducts an ACK scan using NMAP against the external interface of the DMZ firewall. NMAP reports that port 80 is unfiltered. Based on this response, which type of packet inspection is the firewall conducting?

Options:

A.

Host


B.

Stateful


C.

Stateless


D.

Application


Expert Solution
Questions # 148:

Jake is a network administrator who needs to get reports from all the computer and network devices on his network. Jake wants to use SNMP but is afraid that won't be secure since passwords and messages are in clear text. How can Jake gather network information in a secure manner?

Options:

A.

He can use SNMPv3


B.

Jake can use SNMPrev5


C.

He can use SecWMI


D.

Jake can use SecSNMP


Expert Solution
Questions # 149:

If an attacker's computer sends an IPID of 31400 to a zombie (Idle Scanning) computer on an open port, what will be the response?

Options:

A.

31400


B.

31402


C.

The zombie will not send a response


D.

31401


Expert Solution
Questions # 150:

Which type of scan measures a person's external features through a digital video camera?

Options:

A.

Iris scan


B.

Retinal scan


C.

Facial recognition scan


D.

Signature kinetics scan


Expert Solution
Questions # 151:

Hayden is the network security administrator for her company, a large finance firm based in Miami. Hayden just returned from a security conference in Las Vegas where they talked about all kinds of old and new security threats; many of which she did not know of. Hayden is worried about the current security state of her company's network so she decides to start scanning the network from an external IP address. To see how some of the hosts on her network react, she sends out SYN packets to an IP range. A number of IPs responds with a SYN/ACK response. Before the connection is established she sends RST packets to those hosts to stop the session. She does this to see how her intrusion detection system will log the traffic. What type of scan is Hayden attempting here?

Options:

A.

Hayden is attempting to find live hosts on her company's network by using an XMAS scan


B.

She is utilizing a SYN scan to find live hosts that are listening on her network


C.

The type of scan, she is using is called a NULL scan


D.

Hayden is using a half-open scan to find live hosts on her network


Expert Solution
Questions # 152:

Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?

Options:

A.

DataThief


B.

NetCat


C.

Cain and Abel


D.

SQLInjector


Expert Solution
Questions # 153:

The SNMP Read-Only Community String is like a password. The string is sent along with each SNMP Get-Request and allows (or denies) access to a device. Most network vendors ship their equipment with a default password of "public". This is the so-called "default public community string". How would you keep intruders from getting sensitive information regarding the network devices using SNMP? (Select 2 answers)

Options:

A.

Enable SNMPv3 which encrypts username/password authentication


B.

Use your company name as the public community string replacing the default 'public'


C.

Enable IP filtering to limit access to SNMP device


D.

The default configuration provided by device vendors is highly secure and you don't need to change anything


Expert Solution
Questions # 154:

You are trying to hijack a telnet session from a victim machine with IP address 10.0.0.5 to Cisco router at 10.0.0.1. You sniff the traffic and attempt to predict the sequence and acknowledgement numbers to successfully hijack the telnet session.

Here is the captured data in tcpdump.

Question # 154

What are the next sequence and acknowledgement numbers that the router will send to the victim machine?

Options:

A.

Sequence number: 82980070 Acknowledgement number: 17768885A.


B.

Sequence number: 17768729 Acknowledgement number: 82980070B.


C.

Sequence number: 87000070 Acknowledgement number: 85320085C.


D.

Sequence number: 82980010 Acknowledgement number: 17768885D.


Expert Solution
Questions # 155:

Bank of Timbuktu is a medium-sized, regional financial institution in Timbuktu. The bank has deployed a new Internet-accessible Web application recently. Customers can access their account balances, transfer money between accounts, pay bills and conduct online financial business using a Web browser.

John Stevens is in charge of information security at Bank of Timbuktu. After one month in production, several customers have complained about the Internet enabled banking application. Strangely, the account balances of many of the bank's customers had been changed! However, money hasn't been removed from the bank; instead, money was transferred between accounts. Given this attack profile, John Stevens reviewed the Web application's logs and found the following entries:

Question # 155

What kind of attack did the Hacker attempt to carry out at the bank?

Options:

A.

Brute force attack in which the Hacker attempted guessing login ID and password from password cracking tools.


B.

The Hacker attempted Session hijacking, in which the Hacker opened an account with the bank, then logged in to receive a session ID, guessed the next ID and took over Jason's session.


C.

The Hacker used a generator module to pass results to the Web server and exploited Web application CGI vulnerability.


D.

The Hacker first attempted logins with suspected user names, then used SQL Injection to gain access to valid bank login IDs.


Expert Solution
Questions # 156:

What is the main disadvantage of the scripting languages as opposed to compiled programming languages?

Options:

A.

Scripting languages are hard to learn.


B.

Scripting languages are not object-oriented.


C.

Scripting languages cannot be used to create graphical user interfaces.


D.

Scripting languages are slower because they require an interpreter to run the code.


Expert Solution
Questions # 157:

Jeremy is web security consultant for Information Securitas. Jeremy has just been hired to perform contract work for a large state agency in Michigan. Jeremy's first task is to scan all the company's external websites. Jeremy comes upon a login page which appears to allow employees access to sensitive areas on the website. James types in the following statement in the username field:

SELECT * from Users where username='admin' ?AND password='' AND email like '%@testers.com%'

What will the SQL statement accomplish?

Options:

A.

If the page is susceptible to SQL injection, it will look in the Users table for usernames of admin


B.

This statement will look for users with the name of admin, blank passwords, and email addresses that end in @testers.com


C.

This Select SQL statement will log James in if there are any users with NULL passwords


D.

James will be able to see if there are any default user accounts in the SQL database


Expert Solution
Questions # 158:

You generate MD5 128-bit hash on all files and folders on your computer to keep a baseline check for security reasons?

Question # 158

What is the length of the MD5 hash?

Options:

A.

32 character


B.

64 byte


C.

48 char


D.

128 kb


Expert Solution
Questions # 159:

When does the Payment Card Industry Data Security Standard (PCI-DSS) require organizations to perform external and internal penetration testing?

Options:

A.

At least once a year and after any significant upgrade or modification


B.

At least once every three years or after any significant upgrade or modification


C.

At least twice a year or after any significant upgrade or modification


D.

At least once every two years and after any significant upgrade or modification


Expert Solution
Questions # 160:

After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledged (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen, and then opens a second connection from a forged IP address. The attack doesn't see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP address is used for authentication, then the attacker can use the one-sided communication to break into the server. What attacks can you successfully launch against a server using the above technique?

Options:

A.

Denial of Service attacks


B.

Session Hijacking attacks


C.

Web page defacement attacks


D.

IP spoofing attacks


Expert Solution
Viewing page 8 out of 14 pages
Viewing questions 141-160 out of questions