Cause all that matters here is passing the EC-Council 312-50 exam. Cause all that you need is a high score of 312-50 Ethical Hacking and Countermeasures (CEHv6) exam. The only one thing you need to do is downloading Exambible 312-50 exam study guides now. We will not let you down with our money-back guarantee.

Q91. How does a denial-of-service attack work? 

A. A hacker tries to decipher a password by using a system, which subsequently crashes the network 

B. A hacker attempts to imitate a legitimate user by confusing a computer or even another person 

C. A hacker prevents a legitimate user (or group of users) from accessing a service 

D. A hacker uses every character, word, or letter he or she can think of to defeat authentication 

Answer: C

Explanation: In computer security, a denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers, and the attack attempts to make the hosted web pages unavailable on the Internet. It is a computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB). 


Q92. Exhibit: 

Please study the exhibit carefully. 

Which Protocol maintains the communication on that way? 

A. UDP 

B. IP 

C. TCP 

D. ARP 

E. RARP 

Answer: C

Explanation: A TCP connection is always initiated with the 3-way handshake, which establishes and negotiates the actual connection over which data will be sent. 


Q93. A Company security System Administrator is reviewing the network system log files. He notes the following: 

-Network log files are at 5 MB at 12:00 noon. 

-At 14:00 hours, the log files at 3 MB. 

What should he assume has happened and what should he do about the situation? 

A. He should contact the attacker’s ISP as soon as possible and have the connection disconnected. 

B. He should log the event as suspicious activity, continue to investigate, and take further steps according to site security policy. 

C. He should log the file size, and archive the information, because the router crashed. 

D. He should run a file system check, because the Syslog server has a self correcting file system problem. 

E. He should disconnect from the Internet discontinue any further unauthorized use, because an attack has taken place. 

Answer: B

Explanation: You should never assume a host has been compromised without verification. Typically, disconnecting a server is an extreme measure and should only be done when it is confirmed there is a compromise or the server contains such sensitive data that the loss of service outweighs the risk. Never assume that any administrator or automatic process is making changes to a system. Always investigate the root cause of the change on the system and follow your organizations security policy. 


Q94. Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the "echo" command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page in which also he remains unsuccessful. What is the probable cause of Bill's problem? 

A. You cannot use a buffer overflow to deface a web page 

B. There is a problem with the shell and he needs to run the attack again 

C. The HTML file has permissions of read only 

D. The system is a honeypot 

Answer: C


Q95. Your company has blocked all the ports via external firewall and only allows port 80/443 to connect to the Internet. You want to use FTP to connect to some remote server on the Internet. How would you accomplish this? 

A. Use HTTP Tunneling 

B. Use Proxy Chaining 

C. Use TOR Network 

D. Use Reverse Chaining 

Answer: A


Q96. Shayla is an IT security consultant, specializing in social engineering and external penetration tests. Shayla has been hired on by Treks Avionics, a subcontractor for the Department of Defense. Shayla has been given authority to perform any and all tests necessary to audit the company's network security. 

No employees for the company, other than the IT director, know about Shayla's work she will be doing. Shayla's first step is to obtain a list of employees through company website contact pages. Then she befriends a female employee of the company through an online chat website. After meeting with the female employee numerous times, Shayla is able to gain her trust and they become friends. One day, Shayla steals the employee's access badge and uses it to gain unauthorized access to the Treks Avionics offices. 

What type of insider threat would Shayla be considered? 

A. She would be considered an Insider Affiliate 

B. Because she does not have any legal access herself, Shayla would be considered an Outside Affiliate 

C. Shayla is an Insider Associate since she has befriended an actual employee 

D. Since Shayla obtained access with a legitimate company badge; she would be considered a Pure Insider 

Answer: A


Q97. This kind of password cracking method uses word lists in combination with numbers and special characters: 

A. Hybrid 

B. Linear 

C. Symmetric 

D. Brute Force 

Answer: A

Explanation: A Hybrid (or Hybrid Dictionary) Attack uses a word list that it modifies slightly to find passwords that are almost from a dictionary (like St0pid) 


Q98. When discussing passwords, what is considered a brute force attack? 

A. You attempt every single possibility until you exhaust all possible combinations or discover the password 

B. You threaten to use the rubber hose on someone unless they reveal their password 

C. You load a dictionary of words into your cracking program 

D. You create hashes of a large number of words and compare it with the encrypted passwords 

E. You wait until the password expires 

Answer: A

Explanation: Brute force cracking is a time consuming process where you try every possible combination of letters, numbers, and characters until you discover a match. 


Q99. You are the security administrator for a large online auction company based out of Los Angeles. After getting your ENSA CERTIFICATION last year, you have steadily been fortifying your network’s security including training OS hardening and network security. One of the last things you just changed for security reasons was to modify all the built-in administrator accounts on the local computers of PCs and in Active Directory. After through testing you found and no services or programs were affected by the name changes. 

Your company undergoes an outside security audit by a consulting company and they said that even through all the administrator account names were changed, the accounts could still be used by a clever hacker to gain unauthorized access. You argue with the auditors and say that is not possible, so they use a tool and show you how easy it is to utilize the administrator account even though its name was changed. 

What tool did the auditors use? 

A. sid2user 

B. User2sid 

C. GetAcct 

D. Fingerprint 

Answer: A

Explanation: User2sid.exe can retrieve a SID from the SAM (Security Accounts Manager) from the local or a remote machine Sid2user.exe can then be used to retrieve the names of all the user accounts and more. 


Q100. Spears Technology, Inc is a software development company located in Los Angeles, California. They reported a breach in security, stating that its “security defenses has been breached and exploited for 2 weeks by hackers. “The hackers had accessed and downloaded 90,000 address containing customer credit cards and password. Spears Technology found this attack to be so to law enforcement officials to protect their intellectual property. 

How did this attack occur? The intruder entered through an employees home machine, which was connected to Spears Technology, Inc’s corporate VPN network. The application called BEAST Trojan was used in the attack to open a “Back Door” allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge. 

The hackers were traced back to Beijing China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Spears Technology’s network from a remote location, posing as employees. The intent of the attacker was to steal the source code for their VOIP system and “hold it hostage” from Spears Technology, Inc exchange for ransom. 

The hackers had intended on selling the stolen VOIP software source code to competitors. 

How would you prevent such attacks from occurring in the future at Spears Technology? 

A. Disable VPN access to all your employees from home machines 

B. Allow VPN access but replace the standard authentication with biometric authentication 

C. Replace the VPN access with dial-up modem access to the company’s network 

D. Enable 25 character complex password policy for employees to access the VPN network. 

Answer: A

Explanation: As long as there is a way in for employees through all security measures you can’t be secure because you never know what computer the employees use to access recourses at their workplace. 


Q101. WEP is used on 802.11 networks, what was it designed for? 

A. WEP is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what it usually expected of a wired LAN. 

B. WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a lever of integrity and privacy adequate for sensible but unclassified information. 

C. WEP is designed to provide a wireless local area network (WLAN) with a level of availability and privacy comparable to what is usually expected of a wired LAN. 

D. WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy comparable to what it usually expected of a wired LAN. 

Answer: A

Explanation: WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. 


Q102. Network Administrator Patricia is doing an audit of the network. Below are some of her findings concerning DNS. Which of these would be a cause for alarm? 

Select the best answer. 

A. There are two external DNS Servers for Internet domains. Both are AD integrated. 

B. All external DNS is done by an ISP. 

C. Internal AD Integrated DNS servers are using private DNS names that are 

D. unregistered. 

E. Private IP addresses are used on the internal network and are registered with the internal AD integrated DNS server. 

Answer:

Explanations: 

A. There are two external DNS Servers for Internet domains. Both are AD integrated. This is the correct answer. Having an AD integrated DNS external server is a serious cause for alarm. There is no need for this and it causes vulnerability on the network. 

B. All external DNS is done by an ISP. 

This is not the correct answer. This would not be a cause for alarm. This would actually reduce the company's network risk as it is offloaded onto the ISP. 

C. Internal AD Integrated DNS servers are using private DNS names that are unregistered. This is not the correct answer. This would not be a cause for alarm. This would actually reduce the company's network risk. 

D. Private IP addresses are used on the internal network and are registered with the internal AD integrated DNS server. 

This is not the correct answer. This would not be a cause for alarm. This would actually reduce the company's network risk. 


Q103. You find the following entries in your web log. Each shows attempted access to either root.exe or cmd.exe. What caused this? 

GET /scripts/root.exe?/c+dir GET /MSADC/root.exe?/c+dir GET /c/winnt/system32/cmd.exe?/c+dir GET /d/winnt/system32/cmd.exe?/c+dir GET /scripts/..%5c../winnt/system32/cmd.exe?/c+dir GET /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe?/c+dir GET /_mem_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe?/c+dir GET /msadc/..%5c../..%5c../..%5c/..xc1x1c../..xc1x1c../..xc1x1c../winnt/system32/cmd.exe?/c+dir GET /scripts/..xc1x1c../winnt/system32/cmd.exe?/c+dir GET /scripts/..xc0/../winnt/system32/cmd.exe?/c+dir GET /scripts/..xc0xaf../winnt/system32/cmd.exe?/c+dir GET /scripts/..xc1x9c../winnt/system32/cmd.exe?/c+dir GET /scripts/..%35c../winnt/system32/cmd.exe?/c+dir GET /scripts/..%35c../winnt/system32/cmd.exe?/c+dir GET /scripts/..%5c../winnt/system32/cmd.exe?/c+dir GET /scripts/..%2f../winnt/system32/cmd.exe?/c+dir 

A. The Morris worm 

B. The PIF virus 

C. Trinoo 

D. Nimda 

E. Code Red 

F. Ping of Death 

Answer: D

Explanation: The Nimda worm modifies all web content files it finds. As a result, any user browsing web content on the system, whether via the file system or via a web server, may download a copy of the worm. Some browsers may automatically execute the downloaded copy, thereby, infecting the browsing system. The high scanning rate of the Nimda worm may also cause bandwidth denial-of-service conditions on networks with infected machines and allow intruders the ability to execute arbitrary commands within the Local System security context on machines running the unpatched versions of IIS. 


Q104. You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live systems and after scanning each of them you notice that they all show port 21 in closed state. 

What should be the next logical step that should be performed? 

A. Connect to open ports to discover applications. 

B. Perform a ping sweep to identify any additional systems that might be up. 

C. Perform a SYN scan on port 21 to identify any additional systems that might be up. 

D. Rescan every computer to verify the results. 

Answer: C

Explanation: As ICMP is blocked you’ll have trouble determining which computers are up and running by using a ping sweep. As all the 23 computers that you had discovered earlier had port 21 closed, probably any additional, previously unknown, systems will also have port 21 closed. By running a SYN scan on port 21 over the target network you might get replies from additional systems. 


Q105. You are sniffing as unprotected WiFi network located in a JonDonalds Cybercafe with Ethereal to capture hotmail e-mail traffic. You see lots of people using their laptops browsing the web while snipping brewed coffee from JonDonalds. You want to sniff their email message traversing the unprotected WiFi network. 

Which of the following ethereal filters will you configure to display only the packets with the hotmail messages? 

A. (http contains “hotmail”) && ( http contains “Reply-To”) 

B. (http contains “e-mail” ) && (http contains “hotmail”) 

C. (http = “login.passport.com” ) && (http contains “SMTP”) 

D. (http = “login.passport.com” ) && (http contains “POP3”) 

Answer: A

Explanation: Each Hotmail message contains the tag Reply-To:<sender address> and “xxxx-xxx-xxx.xxxx.hotmail.com” in the received tag.