Question # 1 Which type of sniffing technique is generally referred as MiTM attack?
A. Password Sniffing
B. ARP Poisoning
C. Mac Flooding
D. DHCP Sniffing
Click for Answer
Question # 2 Which one of the following instigates a SYN flood attack?
A. Generating excessive broadcast packets.
B. Creating a high number of half-open connections.
C. Inserting repetitive Internet Relay Chat (IRC) messages.
D. A large number of Internet Control Message Protocol (ICMP) traces.
Click for Answer
B. Creating a high number of half-open connections.
Answer Description Explanation: A SYN attack occurs when an attacker exploits the use of the buffer space during a Transmission Control Protocol (TCP) session initialization handshake. The attacker floods the target system's small "in-process" queue with connection requests, but it does not respond when a target system replies to those requests. This causes the target system to time out while waiting for the proper response, which makes the system crash or become unusable.
Question # 3 Study the following exploit code taken from a Linux machine and answer the questions below:
echo “ingreslock stream tcp nowait root /bin/sh sh –I" > /tmp/x; /usr/sbin/inetd –s /tmp/x; sleep 10; /bin/ rm –f /tmp/x AAAA…AAA In the above exploit code, the command “/bin/sh sh –I" is given. What is the purpose, and why is "SH" shown twice?
A. The command /bin/sh sh –i appearing in the exploit code is actually part of an inetd configuration file.
B. The length of such a buffer overflow exploit makes it prohibitive for user to enter manually. The second sh automates this function.
C. It checks for the presence of a codeword (setting the environment variable) among the environment variables.
D. It is a giveaway by the attacker that he is a script kiddy
Click for Answer
A. The command /bin/sh sh –i appearing in the exploit code is actually part of an inetd configuration file.
Answer Description Explanation: Whats going on in the above question is the attacker is trying to write to the unix filed /tm/x (his inetd.conf replacement config) - he is attempting to add a service called ingresslock (which doesnt exist), which is "apparently" suppose to spawn a shell the given port specified by /etc/services for the service "ingresslock", ingresslock is a nonexistant service, and if an attempt were made to respawn inetd, the service would error out on that line. (he would have to add the service to /etc/services to suppress the error). Now the question is asking about /bin/sh sh -i which produces an error that should read "sh: /bin/sh: cannot execute binary file", the -i option places the shell in interactive mode and cannot be used to respawn itself.
Question # 4 In Linux, the three most common commands that hackers usually attempt to Trojan are:
A. car, xterm, grep
B. netstat, ps, top
C. vmware, sed, less
D. xterm, ps, nc
Click for Answer
Answer Description Explanation: The easiest programs to trojan and the smartest ones to trojan are ones commonly run by administrators and users, in this case netstat, ps, and top, for a complete list of commonly trojaned and rootkited software please reference this URL: http://www.usenix.org/publications/login/1999-9/features/rootkits.html
Question # 5 Snort has been used to capture packets on the network. On studying the packets, the penetration tester finds it to be abnormal. If you were the penetration tester, why would you find this abnormal? (Note: The student is being tested on concept learnt during passive OS fingerprinting, basic TCP/IP connection concepts and the ability to read packet signatures from a sniff dumo.) 05/20-17:06:45.061034 192.160.13.4:31337 -> 172.16.1.101:1 TCP TTL:44 TOS:0x10 ID:242 ***FRP** Seq: 0XA1D95 Ack: 0x53 Win: 0x400 . . . 05/20-17:06:58.685879 192.160.13.4:31337 -> 172.16.1.101:1024 TCP TTL:44 TOS:0x10 ID:24242 ***FRP** Seg: 0XA1D95 Ack: 0x53 Win: 0x400 What is odd about this attack? (Choose the most appropriate statement)
A. This is not a spoofed packet as the IP stack has increasing numbers for the three flags.
B. This is back orifice activity as the scan comes from port 31337.
C. The attacker wants to avoid creating a sub-carrier connection that is not normally valid.
D. There packets were created by a tool; they were not created by a standard IP stack.
Click for Answer
B. This is back orifice activity as the scan comes from port 31337.
Answer Description Explanation: Port 31337 is normally used by Back Orifice. Note that 31337 is hackers spelling of ‘elite’, meaning ‘elite hackers’.
Question # 6 How do you defend against Privilege Escalation?
A. Use encryption to protect sensitive data
B. Restrict the interactive logon privileges
C. Run services as unprivileged accounts
D. Allow security settings of IE to zero or Low
E. Run users and applications on the least privileges
Click for Answer
A. Use encryption to protect sensitive data
B. Restrict the interactive logon privileges
C. Run services as unprivileged accounts
E. Run users and applications on the least privileges
Question # 7 Why is Social Engineering considered attractive by hackers and also adopted by experts in the field?
A. It is done by well known hackers and in movies as well.
B. It does not require a computer in order to commit a crime.
C. It is easy and extremely effective to gain information.
D. It is not considered illegal.
Click for Answer
C. It is easy and extremely effective to gain information.
Answer Description Explanation: Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access and in most (but not all) cases the attacker never comes face-toface with the victim. The term has been popularized in recent years by well known (reformed) computer criminal and security consultant Kevin Mitnick who points out that it's much easier to trick someone into giving you his or her password for a system than to spend the effort to hack in. He claims it to be the single most effective method in his arsenal.
Question # 8 Usernames, passwords, e-mail addresses, and the location of CGI scripts may be obtained from which of the following information sources?
A. Company web site
B. Search engines
C. EDGAR Database query
D. Whois query
Click for Answer
Answer Description Explanation: Whois query would not enable us to find the CGI scripts whereas in the actual website, some of them will have scripts written to make the website more user friendly. The EDGAR database would in fact give us a lot of the information requested but not the location of CGI scripts, as would a simple search engine on the Internet if you have the time needed.
Up-to-Date
We always provide up-to-date 312-50 exam dumps to our clients. Keep checking website for updates and download.
Excellence
Quality and excellence of our Certified Ethical Hacker practice questions are above customers expectations. Contact live chat to know more.
Success
Your SUCCESS is assured with the 312-50 exam questions of passin1day.com. Just Buy, Prepare and PASS!
Quality
All our braindumps are verified with their correct answers. Download CEH Certified Ethical Hacker Exams Practice tests in a printable PDF format.
Basic
$80
Any 3 Exams of Your Choice
3 Exams PDF + Online Test Engine
Buy Now
Premium
$100
Any 4 Exams of Your Choice
4 Exams PDF + Online Test Engine
Buy Now
Gold
$125
Any 5 Exams of Your Choice
5 Exams PDF + Online Test Engine
Buy Now
Passin1Day has a big success story in last 12 years with a long list of satisfied customers.
We are UK based company, selling 312-50 practice test questions answers. We have a team of 34 people in Research, Writing, QA, Sales, Support and Marketing departments and helping people get success in their life.
We dont have a single unsatisfied ECCouncil customer in this time. Our customers are our asset and precious to us more than their money.
312-50 Dumps
We have recently updated ECCouncil 312-50 dumps study guide. You can use our CEH Certified Ethical Hacker Exams braindumps and pass your exam in just 24 hours. Our Certified Ethical Hacker real exam contains latest questions. We are providing ECCouncil 312-50 dumps with updates for 3 months. You can purchase in advance and start studying. Whenever ECCouncil update Certified Ethical Hacker exam, we also update our file with new questions. Passin1day is here to provide real 312-50 exam questions to people who find it difficult to pass exam
CEH Certified Ethical Hacker Exams can advance your marketability and prove to be a key to differentiating you from those who have no certification and Passin1day is there to help you pass exam with 312-50 dumps. ECCouncil Certifications demonstrate your competence and make your discerning employers recognize that Certified Ethical Hacker certified employees are more valuable to their organizations and customers. We have helped thousands of customers so far in achieving their goals. Our excellent comprehensive ECCouncil exam dumps will enable you to pass your certification CEH Certified Ethical Hacker Exams exam in just a single try. Passin1day is offering 312-50 braindumps which are accurate and of high-quality verified by the IT professionals. Candidates can instantly download CEH Certified Ethical Hacker Exams dumps and access them at any device after purchase. Online Certified Ethical Hacker practice tests are planned and designed to prepare you completely for the real ECCouncil exam condition. Free 312-50 dumps demos can be available on customer’s demand to check before placing an order.
312-50 Customers
Testimonials
1. I needed to clear ECCouncil 312-50 in
a very short time. I purchased the preparation material from Passin1day.com. I
hardly studied for a couple of days and when I attended the exam I passed with 90% . Thanks, Passin1day.com (Joshua Price)
2. I can honestly say that the
Passin1day braindumps are the best in the market. I wanted to get an IT
certification, so I decided to take ECCouncil 312-50 exam. Thanks to Passin1day.com! I passed my exam with ease
by using your dumps and Practice test software. (Jerry Davis)
3. The braindumps offered by
Passin1day.com for any of the certification exam are really the best. I
prepared with Passin1day for a
couple of my Certification exams and I passed them with flying colors. I am
recommending Passin1day.com to anyone looking to obtain an IT certification. (Walter Coo)
What Our Customers Say
Jeff Brown
Thanks you so much passin1day.com team for all the help that you have provided me in my ECCouncil exam. I will use your dumps for next certification as well.
Mareena Frederick
You guys are awesome. Even 1 day is too much. I prepared my exam in just 3 hours with your 312-50 exam dumps and passed it in first attempt :)
Ralph Donald
I am the fully satisfied customer of passin1day.com. I have passed my exam using your Certified Ethical Hacker braindumps in first attempt. You guys are the secret behind my success ;)
Lilly Solomon
I was so depressed when I get failed in my Cisco exam but thanks GOD you guys exist and helped me in passing my exams. I am nothing without you.