312-50 Premium Bundle

312-50 Premium Bundle

Ethical Hacking and Countermeasures (CEHv6) Certification Exam

4.5 
(30480 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

EC-Council 312-50 Free Practice Questions

Q1. While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS? 

A. Scan more slowly. 

B. Do not scan the broadcast IP. 

C. Spoof the source IP address. 

D. Only scan the Windows systems. 

Answer: B

Explanation: Scanning the broadcast address makes the scan target all IP addresses on that subnet at the same time. 

Q2. Which type of password cracking technique works like dictionary attack but adds some numbers and symbols to the words from the dictionary and tries to crack the password? 

A. Dictionary attack 

B. Brute forcing attack 

C. Hybrid attack 

D. Syllable attack 

E. Rule-based attack 

Answer: C

Q3. Josh is the network administrator for Consultants Galore, an IT consulting firm based in Kansas City. Josh is responsible for the company's entire network which consists of one Windows Server 2003 Active Directory domain. Almost all employees have Remote Desktop access to the servers so they can perform their work duties. Josh has created a security group in Active Directory called "RDP Deny" which contains all the user accounts that should not have Remote Desktop permission to any of the servers. What Group Policy change can Jayson make to ensure that all users in the "RDP Deny" group cannot access the company servers through Remote Desktop? 

A. Josh should add the "RDP Deny" group into the list of Restricted Groups to prevent the users from accessing servers remotely. 

B. By adding the "RDP Deny" group to the "Deny logon as a service" policy, the users in that security group will not be able to establish remote connections to any of the servers. 

C. He should add the "RDP Deny" group to the "Deny RDP connections to member servers" policy. 

D. Josh needs to add the "RDP Deny" group to the "Deny logon through Terminal Services" policy. * 

Answer: D

New questions 

604. Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks? 

A. Configure Port Security on the switch 

B. Configure Port Recon on the switch 

C. Configure Switch Mapping 

D. Configure Multiple Recognition on the switch 

Q4. Sandra is the security administrator of ABC.com. One day she notices that the ABC.com Oracle database server has been compromised and customer information along with financial data has been stolen. The financial loss will be estimated in millions of dollars if the database gets into the hands of competitors. Sandra wants to report this crime to the law enforcement agencies immediately. 

Which organization coordinates computer crime investigations throughout the United States? 

A. NDCA 

B. NICP 

C. CIRP 

D. NPC 

E. CIA 

Answer: D

Q5. Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools? 

A. Ensure all files have at least a 755 or more restrictive permissions. 

B. Configure rules using ipchains. 

C. Configure and enable portsentry on his server. 

D. Install an intrusion detection system on her computer such as Snort. 

Answer: B

Explanation: ipchains is a free software based firewall for Linux. It is a rewrite of Linux's previous IPv4 firewalling code, ipfwadm. In Linux 2.2, ipchains is required to administer the IP packet filters. ipchains was written because the older IPv4 firewall code used in Linux 2.0 did not work with IP fragments and didn't allow for specification of protocols other than TCP, UDP, and ICMP. 

Q6. Bill is a security analyst for his company. All the switches used in the company's office are Cisco switches. Bill wants to make sure all switches are safe from ARP poisoning. How can Bill accomplish this? 

A. Bill can use the command: ip dhcp snooping. 

B. Bill can use the command: no ip snoop. 

C. Bill could use the command: ip arp no flood. 

D. He could use the command: ip arp no snoop. 

Answer: A

Q7. What are the default passwords used by SNMP?(Choose two.) 

A. Password 

B. SA 

C. Private 

D. Administrator 

E. Public 

F. Blank 

Answer: CE

Explanation: Besides the fact that it passes information in clear text, SNMP also uses well-known passwords. Public and private are the default passwords used by SNMP. 

Q8. Darren is the network administrator for Greyson & Associates, a large law firm in Houston. Darren is responsible for all network functions as well as any digital forensics work that is needed. Darren is examining the firewall logs one morning and notices some unusual activity. He traces the activity target to one of the firm's internal file servers and finds that many documents on that server were destroyed. After performing some calculations, Darren finds the damage to be around $75,000 worth of lost data. Darren decides that this incident should be handled and resolved within the same day of its discovery. 

What incident level would this situation be classified as? 

A. This situation would be classified as a mid-level incident 

B. Since there was over $50,000 worth of loss, this would be considered a high-level incident 

C. Because Darren has determined that this issue needs to be addressed in the same day it was discovered, this would be considered a low-level incident 

D. This specific incident would be labeled as an immediate-level incident 

Answer: D

Q9. What is the key advantage of Session Hijacking? 

A. It can be easily done and does not require sophisticated skills. 

B. You can take advantage of an authenticated connection. 

C. You can successfully predict the sequence number generation. 

D. You cannot be traced in case the hijack is detected. 

Answer: B

Explanation: As an attacker you don’t have to steal an account and password in order to take advantage of an authenticated connection. 

Q10. Which of the following is an automated vulnerability assessment tool. 

A. Whack a Mole 

B. Nmap 

C. Nessus 

D. Kismet 

E. Jill32 

Answer:

Explanation: Nessus is a vulnerability assessment tool. 

Q11. NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish? 

nslookup 

> server <ipaddress> 

> set type =any 

> ls -d <target.com> 

A. Enables DNS spoofing 

B. Loads bogus entries into the DNS table 

C. Verifies zone security 

D. Performs a zone transfer 

E. Resets the DNS cache 

Answer: D

Explanation: If DNS has not been properly secured, the command sequence displayed above will perform a zone transfer. 

Q12. Why would an attacker want to perform a scan on port 137? 

A. To discover proxy servers on a network 

B. To disrupt the NetBIOS SMB service on the target host 

C. To check for file and print sharing on Windows systems 

D. To discover information about a target host using NBTSTAT 

Answer: D

Explanation: Microsoft encapsulates netbios information within TCP/Ip using ports 135-139. It is trivial for an attacker to issue the following command: 

nbtstat -A (your Ip address) from their windows machine and collect information about your windows machine (if you are not blocking traffic to port 137 at your borders). 

Q13. You want to hide a secret.txt document inside c:\windows\system32\tcpip.dll kernel library using ADS streams. How will you accomplish this? 

A. copy secret.txt c:\windows\system32\tcpip.dll kernel>secret.txt 

B. copy secret.txt c:\windows\system32\tcpip.dll:secret.txt 

C. copy secret.txt c:\windows\system32\tcpip.dll |secret.txt 

D. copy secret.txt >< c:\windows\system32\tcpip.dll kernel secret.txt 

Answer: B

Q14. When working with Windows systems, what is the RID of the true administrator account? 

A. 500 

B. 501 

C. 1000 

D. 1001 

E. 1024 

F. 512 

Answer: A

Explanation: Because of the way in which Windows functions, the true administrator account always has a RID of 500. 

Q15. "Testing the network using the same methodologies and tools employed by attackers" Identify the correct terminology that defines the above statement. 

A. Vulnerability Scanning 

B. Penetration Testing 

C. Security Policy Implementation 

D. Designing Network Security 

Answer: B

START 312-50 EXAM