312-50 Exam - Ethical Hacking and Countermeasures (CEHv6)

certleader.com

Q1. Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be monitoring the communication link and could inspect captured traffic. She would line to tunnel the information to the remote end but does not have VPN capabilities to do so. 

Which of the following tools can she use to protect the link? 

A. MD5 

B. SSH 

C. RSA 

D. PGP 

Answer: B

Explanation: Port forwarding, or tunneling, is a way to forward otherwise insecure TCP traffic through SSH Secure Shell. You can secure for example POP3, SMTP and HTTP connections that would otherwise be insecure. 

Q2. An attacker finds a web page for a target organization that supplies contact information for the company. Using available details to make the message seem authentic, the attacker drafts e-mail to an employee on the contact page that appears to come from an individual who might reasonably request confidential information, such as a network administrator. 

The email asks the employee to log into a bogus page that requests the employee's user name and password or click on a link that will download spyware or other malicious programming. 

Google's Gmail was hacked using this technique and attackers stole source code and sensitive data from Google servers. This is highly sophisticated attack using zero-day exploit vectors, social engineering and malware websites that focused on targeted individuals working for the company. 

What is this deadly attack called? 

A. Spear phishing attack 

B. Trojan server attack 

C. Javelin attack 

D. Social networking attack 

Answer: A

Q3. While scanning a network you observe that all of the web servers in the DMZ are responding to ACK packets on port 80. 

What can you infer from this observation? 

A. They are using Windows based web servers. 

B. They are using UNIX based web servers. 

C. They are not using an intrusion detection system. 

D. They are not using a stateful inspection firewall. 

Answer: D

Explanation: If they used a stateful inspection firewall this firewall would know if there has been a SYN-ACK before the ACK. 

Q4. Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit. 

Choose the attack type from the choices given below. 

A. Database Fingerprinting 

B. Database Enumeration 

C. SQL Fingerprinting 

D. SQL Enumeration 

Answer: A

Explanation: He is trying to create a view of the characteristics of the target database, he is taking it’s fingerprints. 

Q5. What is the BEST alternative if you discover that a rootkit has been installed on one of your computers? 

A. Copy the system files from a known good system 

B. Perform a trap and trace 

C. Delete the files and try to determine the source 

D. Reload from a previous backup 

E. Reload from known good media 

Answer: E

Explanation: If a rootkit is discovered, you will need to reload from known good media. This typically means performing a complete reinstall. 

Q6. Sandra is conducting a penetration test for ABC.com. She knows that ABC.com is using wireless networking for some of the offices in the building right down the street. Through social engineering she discovers that they are using 802.11g. Sandra knows that 802.11g uses the same 2.4GHz frequency range as 802.11b. Using NetStumbler and her 802.11b wireless NIC, Sandra drives over to the building to map the wireless networks. However, even though she repositions herself around the building several times, Sandra is not able to detect a single AP. 

What do you think is the reason behind this? 

A. Netstumbler does not work against 802.11g. 

B. You can only pick up 802.11g signals with 802.11a wireless cards. 

C. The access points probably have WEP enabled so they cannot be detected. 

D. The access points probably have disabled broadcasting of the SSID so they cannot be detected. 

E. 802.11g uses OFDM while 802.11b uses DSSS so despite the same frequency and 802.11b card cannot see an 802.11g signal. 

F. Sandra must be doing something wrong, as there is no reason for her to not see the signals. 

Answer: D

Explanation: Netstumbler can not detect networks that do not respond to broadcast requests. 

Q7. This tool is widely used for ARP Poisoning attack. Name the tool. 

A. Cain and Able 

B. Beat Infector 

C. Poison Ivy 

D. Webarp Infector 

Answer: A

Q8. Bryce the bad boy is purposely sending fragmented ICMP packets to a remote target. The tool size of this ICMP packet once reconstructed is over 65,536 bytes. From the information given, what type of attack is Bryce attempting to perform? 

A. Smurf 

B. Fraggle 

C. SYN Flood 

D. Ping of Death 

Answer: D

Explanation: A ping of death (abbreviated "POD") is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. A ping is normally 64 bytes in size (or 84 bytes when IP header is considered); many computer systems cannot handle a ping larger than the maximum IP packet size, which is 65,535 bytes. Sending a ping of this size can crash the target computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65,536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash. 

Q9. In this type of Man-in-the-Middle attack, packets and authentication tokens are captured using a sniffer. Once the relevant information is extracted, the tokens are placed back on the network to gain access. 

A. Token Injection Replay attacks 

B. Shoulder surfing attack 

C. Rainbow and Hash generation attack 

D. Dumpster diving attack 

Answer: A

Q10. Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and forward it so that the server might perform undesirable actions. Alternatively, the attacker could pose as the server or client after a legitimate authentication and gain unauthorized access to data. Which of the following is NOT a means that can be used to minimize or protect against such an attack? 

A. Timestamps 

B. SMB Signing 

C. File permissions 

D. Sequence numbers monitoring 

Answer: ABD