312-50 Exam - Ethical Hacking and Countermeasures (CEHv6)

certleader.com

Q1. Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database? 

A. Jimmy can submit user input that executes an operating system command to compromise a target system 

B. Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system 

C. Jimmy can utilize an incorrect configuration that leads to access with higher-than-expected privilege of the database 

D. Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access 

Answer: B

Explanation: SQL injection is a security vulnerability that occurs in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is in fact an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another. 

Q2. Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a server and came across some inconsistencies. Wayne finds some IP packets from a computer purporting to be on the internal network. The packets originate from 192.168.12.35 with a TTL of 

15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of 

21. What can Wayne infer from this traffic log? 

A. The initial traffic from 192.168.12.35 was being spoofed. 

B. The traffic from 192.168.12.25 is from a Linux computer. 

C. The TTL of 21 means that the client computer is on wireless. 

D. The client computer at 192.168.12.35 is a zombie computer. 

Answer: A

Q3. You may be able to identify the IP addresses and machine names for the firewall, and the names of internal mail servers by: 

A. Sending a mail message to a valid address on the target network, and examining the header information generated by the IMAP servers 

B. Examining the SMTP header information generated by using the –mx command parameter of DIG 

C. Examining the SMTP header information generated in response to an e-mail message sent to an invalid address 

D. Sending a mail message to an invalid address on the target network, and examining the header information generated by the POP servers 

Answer: C

Q4. You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discover the internal structure of publicly accessible areas of the network. 

How can you achieve this? 

A. Block ICMP at the firewall. 

B. Block UDP at the firewall. 

C. Both A and B. 

D. There is no way to completely block doing a trace route into this area. 

Answer: D

Explanation: When you run a traceroute to a target network address, you send a UDP packet with one time to live (TTL) to the target address. The first router this packet hits decreases the TTL to 0 and rejects the packet. Now the TTL for the packet is expired. The router sends back an ICMP message type 11 (Exceeded) code 0 (TTL--Exceeded) packet to your system with a source address. Your system displays the round-trip time for that first hop and sends out the next UDP packet with a TTL of 2.This process continues until you receive an ICMP message type 3 (Unreachable) code 3 (Port--Unreachable) from the destination system. Traceroute is completed when your machine receives a Port-Unreachable message.If you receive a message with three asterisks [* * *] during the traceroute, a router in the path doesn't return ICMP messages. Traceroute will continue to send UDP packets until the destination is reached or the maximum number of hops is exceeded. 

Q5. E-mail tracking is a method to monitor and spy the delivered e-mails to the intended recipient. 

Select a feature, which you will NOT be able to accomplish with this probe? 

A. When the e-mail was received and read 

B. Send destructive e-mails 

C. GPS location and map of the recipient 

D. Time spent on reading the e-mails 

E. Whether or not the recipient visited any links sent to them 

F. Track PDF and other types of attachments 

G. Set messages to expire after specified time 

H. Remote control the User's E-mail client application and hijack the traffic 

Answer: H

Q6. How do you defend against MAC attacks on a switch? 

A. Disable SPAN port on the switch 

B. Enable SNMP Trap on the switch 

C. Configure IP security on the switch 

D. Enable Port Security on the switch 

Answer: D

Q7. What do you call a pre-computed hash? 

A. Sun tables 

B. Apple tables 

C. Rainbow tables 

D. Moon tables 

Answer: C

Q8. Study the snort rule given below and interpret the rule. 

alert tcp any any --> 192.168.1.0/24 111 (content:"|00 01 86 a5|"; msg: "mountd access";) 

A. An alert is generated when a TCP packet is originated from port 111 of any IP address to the 

192.168.1.0 subnet 

B. An alert is generated when any packet other than a TCP packet is seen on the network and destined for the 192.168.1.0 subnet 

C. An alert is generated when a TCP packet is generated from any IP on the 192.168.1.0 subnet and destined to any IP on port 111 

D. An alert is generated when a TCP packet originating from any IP address is seen on the network and destined for any IP address on the 192.168.1.0 subnet on port 111 

Answer: D

Explanation: Refer to the online documentation on creating Snort rules at http://snort.org/docs/snort_htmanuals/htmanual_261/node147.html 

Q9. An Nmap scan shows the following open ports, and nmap also reports that the OS guessing results to match too many signatures hence it cannot reliably be identified: 

21 ftp 23 telnet 80 http 443 https 

What does this suggest ? 

A. This is a Windows Domain Controller 

B. The host is not firewalled 

C. The host is not a Linux or Solaris system 

D. The host is not properly patched 

Answer: D

Explanation: If the answer was A nmap would guess it, it holds the MS signature database, the host not being firewalled makes no difference. The host is not linux or solaris, well it very well could be. The host is not properly patched? That is the closest; nmaps OS detection architecture is based solely off the TCP ISN issued by the operating systems TCP/IP stack, if the stack is modified to show output from randomized ISN's or if your using a program to change the ISN then OS detection will fail. If the TCP/IP IP ID's are modified then os detection could also fail, because the machine would most likely come back as being down. 

Q10. Which of the following Exclusive OR transforms bits is NOT correct? 

A. 0 xor 0 = 0 

B. 1 xor 0 = 1 

C. 1 xor 1 = 1 

D. 0 xor 1 = 1 

Answer: C