Question # 1 In Linux, the three most common commands that hackers usually attempt to Trojan are:
A. car, xterm, grep
B. netstat, ps, top
C. vmware, sed, less
D. xterm, ps, nc
Click for Answer
Answer Description Explanation: The easiest programs to trojan and the smartest ones to trojan are ones commonly run by administrators and users, in this case netstat, ps, and top, for a complete list of commonly trojaned and rootkited software please reference this URL: http://www.usenix.org/publications/login/1999-9/features/rootkits.html
Question # 2 You are the security administrator of Jaco Banking Systems located in Boston. You are setting up e-banking website (http://www.ejacobank.com) authentication system. Instead of issuing banking customer with a single password, you give them a printed list of 100 unique passwords. Each time the customer needs to log into the e-banking system website, the customer enters the next password on the list. If someone sees them type the password using shoulder surfing, MiTM or keyloggers, then no damage is done because the password will not be accepted a second time. Once the list of 100 passwords is almost finished, the system automatically sends out a new password list by encrypted e-mail to the customer. You are confident that this security implementation will protect the customer from password abuse. Two months later, a group of hackers called "HackJihad" found a way to access the onetime password list issued to customers of Jaco Banking Systems. The hackers set up a fake website (http://www.e-jacobank.com) and used phishing attacks to direct ignorant customers to it. The fake website asked users for their e-banking username and password, and the next unused entry from their one-time password sheet. The hackers collected 200 customer's username/passwords this way. They transferred money from the customer's bank account to various offshore accounts. Your decision of password policy implementation has cost the bank with USD 925,000 to hackers. You immediately shut down the e-banking website while figuring out the next best security solution What effective security solution will you recommend in this case?
A. Implement Biometrics based password authentication system. Record the customers face image to the authentication database
B. Configure your firewall to block logon attempts of more than three wrong tries
C. Enable a complex password policy of 20 characters and ask the user to change the password immediately after they logon and do not store password histories
D. Implement RSA SecureID based authentication system
Click for Answer
D. Implement RSA SecureID based authentication system
Question # 3 One of your junior administrator is concerned with Windows LM hashes and password cracking. In your discussion with them, which of the following are true statements that you would point out? Select the best answers.
A. John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case.
B. BY using NTLMV1, you have implemented an effective countermeasure to password cracking.
C. SYSKEY is an effective countermeasure.
D. If a Windows LM password is 7 characters or less, the hash will be passed with the following characters, in HEX- 00112233445566778899.
E. Enforcing Windows complex passwords is an effective countermeasure.
Click for Answer
A. John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case.
C. SYSKEY is an effective countermeasure.
E. Enforcing Windows complex passwords is an effective countermeasure.
Answer Description Explanation: Explanations: John the Ripper can be used to crack a variety of passwords, but one limitation is that the output doesn't show if the password is upper or lower case. John the Ripper is a very effective password cracker. It can crack passwords for many different types of operating systems. However, one limitation is that the output doesn't show if the password is upper or lower case. BY using NTLMV1, you have implemented an effective countermeasure to password cracking. NTLM Version 2 (NTLMV2) is a good countermeasure to LM password cracking (and therefore a correct answer). To do this, set Windows 9x and NT systems to "send NTLMv2 responses only". SYSKEY is an effective countermeasure. It uses 128 bit encryption on the local copy of the Windows SAM. If a Windows LM password is 7 characters or less, the has will be passed with the following characters: 0xAAD3B435B51404EE Enforcing Windows complex passwords is an effective countermeasure to password cracking. Complex passwords are- greater than 6 characters and have any 3 of the following 4 items: upper case, lower case, special characters, and numbers.
Question # 4 Exhibit: ettercap –NCLzs -quiet What does the command in the exhibit do in “Ettercap”?
A. This command will provide you the entire list of hosts in the LAN
B. This command will check if someone is poisoning you and will report its IP.
C. This command will detach from console and log all the collected passwords from the network to a file.
D. This command broadcasts ping to scan the LAN instead of ARP request of all the subnet IPs.
Click for Answer
C. This command will detach from console and log all the collected passwords from the network to a file.
Answer Description Explanation: -N = NON interactive mode (without ncurses) -C = collect all users and passwords -L = if used with -C (collector) it creates a file with all the password sniffed in the session in the form "YYYYMMDD-collected-pass.log" -z = start in silent mode (no arp storm on start up) -s = IP BASED sniffing -quiet = "demonize" ettercap. Useful if you want to log all data in background.
Question # 5 After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledge (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen and then opens a second connection from a forget IP address. The attack doesn’t see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP Address is used for authentication, the attacker can use the one-side communication to break into the server. What attacks can you successfully launch against a server using the above technique?
A. Session Hijacking attacks
B. Denial of Service attacks
C. Web Page defacement attacks
D. IP Spoofing Attacks
Click for Answer
A. Session Hijacking attacks
Answer Description Explanation: The term Session Hijacking refers to the exploitation of a valid computer session - sometimes also called a session key - to gain unauthorised access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer.
Question # 6 Which Type of scan sends a packets with no flags set ? Select the Answer
A. Open Scan
B. Null Scan
C. Xmas Scan
D. Half-Open Scan
Click for Answer
Answer Description Explanation: The types of port connections supported are: TCP Full Connect. This mode makes a full connection to the target's TCP ports and can save any data or banners returned from the target. This mode is the most accurate for determining TCP services, but it is also easily recognized by Intrusion Detection Systems (IDS). UDP ICMP Port Unreachable Connect. This mode sends a short UDP packet to the target's UDP ports and looks for an ICMP Port Unreachable message in return. The absence of that message indicates either the port is used, or the target does not return the ICMP message which can lead to false positives. It can save any data or banners returned from the target. This mode is also easily recognized by IDS. TCP Full/UDP ICMP Combined. This mode combines the previous two modes into one operation. TCP SYN Half Open. (Windows XP/2000 only) This mode sends out a SYN packet to the target port and listens for the appropriate response. Open ports respond with a SYN|ACK and closed ports respond with ACK|RST or RST. This mode is less likely to be noted by IDS, but since the connection is never fully completed, it cannot gather data or banner information. However, the attacker has full control over TTL, Source Port, MTU, Sequence number, and Window parameters in the SYN packet. TCP Other. (Windows XP/2000 only) This mode sends out a TCP packet with any combination of the SYN, FIN, ACK, RST, PSH, URG flags set to the target port and listens for the response. Again, the attacker can have full control over TTL, Source Port, MTU, Sequence number, and Window parameters in the custom TCP packet. The Analyze feature helps with analyzing the response based on the flag settings chosen. Each operating system responds differently to these special combinations. The tool includes presets for XMAS, NULL, FIN and ACK flag settings.
Question # 7 What are the four steps is used by nmap scanning?
A. DNS Lookup
B. ICMP Message
C. Ping
D. Reverse DNS lookup
E. TCP three way handshake
Click for Answer
A. DNS Lookup
C. Ping
D. Reverse DNS lookup
Answer Description Explanation: Nmap performs four steps during a normal device scan. Some of these steps can be modified or disabled using options on the nmap command line. If a hostname is used as a remote device specification, nmap will perform a DNS lookup prior to the scan. Nmap pings the remote device. This refers to the nmap "ping" process, not (necessarily) a traditional ICMP echo request. If an IP address is specified as the remote device, nmap will perform a reverse DNS lookup in an effort to identify a name that might be associated with the IP address. This is the opposite process of what happens in step 1, where an IP address is found from a hostname specification. Nmap executes the scan. Once the scan is over, this four-step process is completed. Except for the actual scan process in step four, each of these steps can be disabled or prevented using different IP addressing or nmap options. The nmap process can be as "quiet" or as "loud" as necessary!
Question # 8 Bob is a very security conscious computer user. He plans to test a site that is known to have malicious applets, code, and more. Bob always make use of a basic Web Browser to perform such testing. Which of the following web browser can adequately fill this purpose?
A. Internet Explorer
B. Mozila
C. Lynx
D. Tiger
Click for Answer
Answer Description Explanation: Lynx is a program used to browse the World Wide Web, which works on simple text terminals, rather than requiring a graphical computer display terminal.
Up-to-Date
We always provide up-to-date 312-50 exam dumps to our clients. Keep checking website for updates and download.
Excellence
Quality and excellence of our Certified Ethical Hacker practice questions are above customers expectations. Contact live chat to know more.
Success
Your SUCCESS is assured with the 312-50 exam questions of passin1day.com. Just Buy, Prepare and PASS!
Quality
All our braindumps are verified with their correct answers. Download CEH Certified Ethical Hacker Exams Practice tests in a printable PDF format.
Basic
$80
Any 3 Exams of Your Choice
3 Exams PDF + Online Test Engine
Buy Now
Premium
$100
Any 4 Exams of Your Choice
4 Exams PDF + Online Test Engine
Buy Now
Gold
$125
Any 5 Exams of Your Choice
5 Exams PDF + Online Test Engine
Buy Now
Passin1Day has a big success story in last 12 years with a long list of satisfied customers.
We are UK based company, selling 312-50 practice test questions answers. We have a team of 34 people in Research, Writing, QA, Sales, Support and Marketing departments and helping people get success in their life.
We dont have a single unsatisfied ECCouncil customer in this time. Our customers are our asset and precious to us more than their money.
312-50 Dumps
We have recently updated ECCouncil 312-50 dumps study guide. You can use our CEH Certified Ethical Hacker Exams braindumps and pass your exam in just 24 hours. Our Certified Ethical Hacker real exam contains latest questions. We are providing ECCouncil 312-50 dumps with updates for 3 months. You can purchase in advance and start studying. Whenever ECCouncil update Certified Ethical Hacker exam, we also update our file with new questions. Passin1day is here to provide real 312-50 exam questions to people who find it difficult to pass exam
CEH Certified Ethical Hacker Exams can advance your marketability and prove to be a key to differentiating you from those who have no certification and Passin1day is there to help you pass exam with 312-50 dumps. ECCouncil Certifications demonstrate your competence and make your discerning employers recognize that Certified Ethical Hacker certified employees are more valuable to their organizations and customers. We have helped thousands of customers so far in achieving their goals. Our excellent comprehensive ECCouncil exam dumps will enable you to pass your certification CEH Certified Ethical Hacker Exams exam in just a single try. Passin1day is offering 312-50 braindumps which are accurate and of high-quality verified by the IT professionals. Candidates can instantly download CEH Certified Ethical Hacker Exams dumps and access them at any device after purchase. Online Certified Ethical Hacker practice tests are planned and designed to prepare you completely for the real ECCouncil exam condition. Free 312-50 dumps demos can be available on customer’s demand to check before placing an order.
312-50 Customers
Testimonials
1. I needed to clear ECCouncil 312-50 in
a very short time. I purchased the preparation material from Passin1day.com. I
hardly studied for a couple of days and when I attended the exam I passed with 90% . Thanks, Passin1day.com (Joshua Price)
2. I can honestly say that the
Passin1day braindumps are the best in the market. I wanted to get an IT
certification, so I decided to take ECCouncil 312-50 exam. Thanks to Passin1day.com! I passed my exam with ease
by using your dumps and Practice test software. (Jerry Davis)
3. The braindumps offered by
Passin1day.com for any of the certification exam are really the best. I
prepared with Passin1day for a
couple of my Certification exams and I passed them with flying colors. I am
recommending Passin1day.com to anyone looking to obtain an IT certification. (Walter Coo)
What Our Customers Say
Jeff Brown
Thanks you so much passin1day.com team for all the help that you have provided me in my ECCouncil exam. I will use your dumps for next certification as well.
Mareena Frederick
You guys are awesome. Even 1 day is too much. I prepared my exam in just 3 hours with your 312-50 exam dumps and passed it in first attempt :)
Ralph Donald
I am the fully satisfied customer of passin1day.com. I have passed my exam using your Certified Ethical Hacker braindumps in first attempt. You guys are the secret behind my success ;)
Lilly Solomon
I was so depressed when I get failed in my Cisco exam but thanks GOD you guys exist and helped me in passing my exams. I am nothing without you.