312-50 Premium Bundle

312-50 Premium Bundle

Ethical Hacking and Countermeasures (CEHv6) Certification Exam

4.5 
(10665 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

EC-Council 312-50 Free Practice Questions

Q1. What does an ICMP (Code 13) message normally indicates? 

A. It indicates that the destination host is unreachable 

B. It indicates to the host that the datagram which triggered the source quench message will need to be re-sent 

C. It indicates that the packet has been administratively dropped in transit 

D. It is a request to the host to cut back the rate at which it is sending traffic to the Internet destination 

Answer: C

Explanation: CODE 13 and type 3 is destination unreachable due to communication administratively prohibited by filtering hence maybe they meant "code 13", therefore would be C). 

Note:A - Type 3B - Type 4C - Type 3 Code 13D - Typ4 4 

Q2. In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob’s public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message. 

Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob’s public key and use it to verify Bob’s signature, they cannot discover Bob’s private key and use it to forge digital signatures. 

What does this principle refer to? 

A. Irreversibility 

B. Non-repudiation 

C. Symmetry 

D. Asymmetry 

Answer: D

Explanation: PKI uses asymmetric key pair encryption. One key of the pair is the only way to decrypt data encrypted with the other. 

Q3. When referring to the Domain Name Service, what is denoted by a ‘zone’? 

A. It is the first domain that belongs to a company. 

B. It is a collection of resource records. 

C. It is the first resource record type in the SOA. 

D. It is a collection of domains. 

Answer: B

Explanation: A reasonable definition of a zone would be a portion of the DNS namespace where responsibility has been delegated. 

Q4. You work for Acme Corporation as Sales Manager. The company has tight network security restrictions. You are trying to steal data from the company's Sales database (Sales.xls) and transfer them to your home computer. Your company filters and monitors traffic that leaves from the internal network to the Internet. How will you achieve this without raising suspicion? 

A. Encrypt the Sales.xls using PGP and e-mail it to your personal gmail account 

B. Package the Sales.xls using Trojan wrappers and telnet them back your home computer 

C. You can conceal the Sales.xls database in another file like photo.jpg or other files and send it out in an innocent looking email or file transfer using Steganography techniques 

D. Change the extension of Sales.xls to sales.txt and upload them as attachment to your hotmail account 

Answer: C

Q5. What is the best means of prevention against viruses? 

A. Assign read only permission to all files on your system. 

B. Remove any external devices such as floppy and USB connectors. 

C. Install a rootkit detection tool. 

D. Install and update anti-virus scanner. 

Answer: D

Explanation: Although virus scanners only can find already known viruses this is still the best defense, together with users that are informed about risks with the internet. 

Q6. What port number is used by Kerberos protocol? 

A. 44 

B. 88 

C. 419 

D. 487 

Answer:

Explanation: Kerberos traffic uses UDP/TCP protocol source and destination port 88. 

Q7. What does the following command in netcat do? 

nc -l -u -p 55555 < /etc/passwd 

A. logs the incoming connections to /etc/passwd file 

B. loads the /etc/passwd file to the UDP port 55555 

C. grabs the /etc/passwd file when connected to UDP port 55555 

D. deletes the /etc/passwd file when connected to the UDP port 55555 

Answer: C

Explanation: -l forces netcat to listen for incoming connections. 

-u tells netcat to use UDP instead of TCP 

-p 5555 tells netcat to use port 5555 

< /etc/passwd tells netcat to grab the /etc/passwd file when connected to. 

Q8. What type of port scan is represented here. 

A. Stealth Scan 

B. Full Scan 

C. XMAS Scan 

D. FIN Scan 

Answer: A

Q9. You receive an e-mail like the one shown below. When you click on the link contained in the mail, you are redirected to a website seeking you to download free Anti-Virus software. 

Dear valued customers, 

We are pleased to announce the newest version of Antivirus 2010 for Windows which will probe you with total security against the latest spyware, malware, viruses, Trojans and other online threats. Simply visit the link below and enter your antivirus code: 

Antivirus code: 5014 

http://www.juggyboy/virus/virus.html 

Thank you for choosing us, the worldwide leader Antivirus solutions. 

Mike Robertson 

PDF Reader Support 

Copyright Antivirus 2010 ?All rights reserved 

If you want to stop receiving mail, please go to: 

http://www.juggyboy.com 

or you may contact us at the following address: Media Internet Consultants, Edif. Neptuno, Planta 

Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama 

How will you determine if this is Real Anti-Virus or Fake Anti-Virus website? 

A. Look at the website design, if it looks professional then it is a Real Anti-Virus website 

B. Connect to the site using SSL, if you are successful then the website is genuine 

C. Search using the URL and Anti-Virus product name into Google and lookout for suspicious warnings against this site 

D. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware 

E. Download and install Anti-Virus software from this suspicious looking site, your Windows 7 will prompt you and stop the installation if the downloaded file is a malware 

Answer: C

Q10. How does a denial-of-service attack work? 

A. A hacker tries to decipher a password by using a system, which subsequently crashes the network 

B. A hacker attempts to imitate a legitimate user by confusing a computer or even another person 

C. A hacker prevents a legitimate user (or group of users) from accessing a service 

D. A hacker uses every character, word, or letter he or she can think of to defeat authentication 

Answer: C

Explanation: In computer security, a denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers, and the attack attempts to make the hosted web pages unavailable on the Internet. It is a computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB). 

Q11. What is the proper response for a X-MAS scan if the port is closed? 

A. SYN 

B. ACK 

C. FIN 

D. PSH 

E. RST 

F. No response 

Answer:

Explanation: Closed ports respond to a X-MAS scan with a RST. 

Q12. Shayla is an IT security consultant, specializing in social engineering and external penetration tests. Shayla has been hired on by Treks Avionics, a subcontractor for the Department of Defense. Shayla has been given authority to perform any and all tests necessary to audit the company's network security. 

No employees for the company, other than the IT director, know about Shayla's work she will be doing. Shayla's first step is to obtain a list of employees through company website contact pages. Then she befriends a female employee of the company through an online chat website. After meeting with the female employee numerous times, Shayla is able to gain her trust and they become friends. One day, Shayla steals the employee's access badge and uses it to gain unauthorized access to the Treks Avionics offices. 

What type of insider threat would Shayla be considered? 

A. She would be considered an Insider Affiliate 

B. Because she does not have any legal access herself, Shayla would be considered an Outside Affiliate 

C. Shayla is an Insider Associate since she has befriended an actual employee 

D. Since Shayla obtained access with a legitimate company badge; she would be considered a Pure Insider 

Answer: A

Q13. Neil notices that a single address is generating traffic from its port 500 to port 500 of several other machines on the network. This scan is eating up most of the network bandwidth and Neil is concerned. As a security professional, what would you infer from this scan? 

A. It is a network fault and the originating machine is in a network loop 

B. It is a worm that is malfunctioning or hardcoded to scan on port 500 

C. The attacker is trying to detect machines on the network which have SSL enabled 

D. The attacker is trying to determine the type of VPN implementation and checking for IPSec 

Answer: D

Explanation: Port 500 is used by IKE (Internet Key Exchange). This is typically used for IPSEC-based VPN software, such as Freeswan, PGPnet, and various vendors of in-a-box VPN solutions such as Cisco. IKE is used to set up the session keys. The actual session is usually sent with ESP (Encapsulated Security Payload) packets, IP protocol 50 (but some in-a-box VPN's such as Cisco are capable of negotiating to send the encrypted tunnel over a UDP channel, which is useful for use across firewalls that block IP protocols other than TCP or UDP). 

Q14. In order to attack wireless network, you put up an access point and override the signal of the real access point. And when users send authentication data, you are able to capture it. What kind of attack is this? 

A. WEP Attack 

B. Drive by hacking 

C. Rogue Access Point Attack 

D. Unauthorized Access Point Attack 

Answer: C

Explanation: A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network management or has been created to allow a cracker to conduct a man-in-the-middle attack. 

Q15. Joseph was the Web site administrator for the Mason Insurance in New York, who's main Web site was located at www.masonins.com. Joseph uses his laptop computer regularly to administer the Web site. One night, Joseph received an urgent phone call from his friend, Smith. According to Smith, the main Mason Insurance web site had been vandalized! All of its normal content was removed and replaced with an attacker's message ''Hacker Message: You are dead! Freaks!'' 

From his office, which was directly connected to Mason Insurance's internal network, Joseph surfed to the Web site using his laptop. In his browser, the Web site looked completely intact. No changes were apparent. Joseph called a friend of his at his home to help troubleshoot the problem. The Web site appeared defaced when his friend visited using his DSL connection. So, while Smith and his friend could see the defaced page, Joseph saw the intact Mason Insurance web site. To help make sense of this problem, Joseph decided to access the Web site using his dial-up ISP. He disconnected his laptop from the corporate internal network and used his modem to dial up the same ISP used by Smith. After his modem connected, he quickly typed www.masonins.com in his browser to reveal the following web page: 

H@cker Mess@ge: 

Y0u @re De@d! Fre@ks! 

After seeing the defaced Web site, he disconnected his dial-up line, reconnected to the internal network, and used Secure Shell (SSH) to log in directly to the Web server. He ran Tripwire against the entire Web site, and determined that every system file and all the Web content on the server were intact. 

How did the attacker accomplish this hack? 

A. ARP spoofing 

B. SQL injection 

C. DNS poisoning 

D. Routing table injection 

Answer: C

Explanation: External calls for the Web site has been redirected to another server by a successful DNS poisoning. 

START 312-50 EXAM