312-50 Exam - Ethical Hacking and Countermeasures (CEHv6)

certleader.com

Q1. Where should a security tester be looking for information that could be used by an attacker against an organization? (Select all that apply) 

A. CHAT rooms 

B. WHOIS database 

C. News groups 

D. Web sites E. Search engines 

F. Organization’s own web site 

Answer: ABCDEF 

Explanation: A Security tester should search for information everywhere that he/she can access. 

You never know where you find that small piece of information that could penetrate a strong defense. 

Q2. Why attackers use proxy servers? 

A. To ensure the exploits used in the attacks always flip reverse vectors 

B. Faster bandwidth performance and increase in attack speed 

C. Interrupt the remote victim's network traffic and reroute the packets to attackers machine 

D. To hide the source IP address so that an attacker can hack without any legal corollary 

Answer: D

Q3. Which type of scan does not open a full TCP connection? 

A. Stealth Scan 

B. XMAS Scan 

C. Null Scan 

D. FIN Scan 

Answer: A

Explanation: Stealth Scan: Instead of completing the full TCP three-way-handshake a full connection is not made. A SYN packet is sent to the system and if a SYN/ACK packet is received it is assumed that the port on the system is active. In that case a RST/ACK will be sent which will determined the listening state the system is in. If a RST/ACK packet is received, it is assumed that the port on the system is not active. 

Q4. Which of the following is NOT true of cryptography? 

A. Science of protecting information by encoding it into an unreadable format 

B. Method of storing and transmitting data in a form that only those it is intended for can read and process 

C. Most (if not all) algorithms can be broken by both technical and non-technical means 

D. An effective way of protecting sensitive information in storage but not in transit 

Answer:

Explanation: Cryptography will protect data in both storage and in transit. 

Q5. When a malicious hacker identifies a target and wants to eventually compromise this target, what would be among the first steps that he would perform? (Choose the best answer) 

A. Cover his tracks by eradicating the log files and audit trails. 

B. Gain access to the remote computer in order to conceal the venue of attacks. 

C. Perform a reconnaissance of the remote target for identical of venue of attacks. 

D. Always begin with a scan in order to quickly identify venue of attacks. 

Answer: C

Explanation: A hacker always starts with a preparatory phase (Reconnaissance) where he seeks to gather as much information as possible about the target of evaluation prior to launching an attack. The reconnaissance can be either passive or active (or both). 

Q6. ou are gathering competitive intelligence on ABC.com. You notice that they have jobs 

listed on a few Internet job-hunting sites. There are two job postings for network and system administrators. How can this help you in footprint the organization? 

A. The IP range used by the target network 

B. An understanding of the number of employees in the company 

C. How strong the corporate security policy is 

D. The types of operating systems and applications being used. 

Answer: D

Explanation: From job posting descriptions one can see which is the set of skills, technical knowledge, system experience required, hence it is possible to argue what kind of operating systems and applications the target organization is using. 

Q7. One of your team members has asked you to analyze the following SOA record. What is the TTL? 

Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600 604800 2400. 

A. 200303028 

B. 3600 

C. 604800 

D. 2400 

E. 60 

F. 4800 

Answer: D

Explanation: The SOA includes a timeout value. This value can tell an attacker how long any DNS "poisoning" would last. It is the last set of numbers in the record. 

Q8. You are the CIO for Avantes Finance International, a global finance company based in Geneva. You are responsible for network functions and logical security throughout the entire corporation. Your company has over 250 servers running Windows Server, 5000 workstations running Windows Vista, and 200 mobile users working from laptops on Windows 7. 

Last week, 10 of your company's laptops were stolen from salesmen while at a conference in Amsterdam. These laptops contained proprietary company information. While doing damage assessment on the possible public relations nightmare this may become, a news story leaks about the stolen laptops and also that sensitive information from those computers was posted to a blog online. 

What built-in Windows feature could you have implemented to protect the sensitive information on these laptops? 

A. You should have used 3DES which is built into Windows 

B. If you would have implemented Pretty Good Privacy (PGP) which is built into Windows, the sensitive information on the laptops would not have leaked out 

C. You should have utilized the built-in feature of Distributed File System (DFS) to protect the sensitive information on the laptops 

D. You could have implemented Encrypted File System (EFS) to encrypt the sensitive files on the laptops 

Answer: D

Q9. Which of the following is an automated vulnerability assessment tool. 

A. Whack a Mole 

B. Nmap 

C. Nessus 

D. Kismet 

E. Jill32 

Answer:

Explanation: Nessus is a vulnerability assessment tool. 

Q10. Stephanie works as senior security analyst for a manufacturing company in Detroit. Stephanie manages network security throughout the organization. Her colleague Jason told her in confidence that he was able to see confidential corporate information posted on the external website http://www.jeansclothesman.com. He tries random URLs on the company's website and finds confidential information leaked over the web. Jason says this happened about a month ago. Stephanie visits the said URLs, but she finds nothing. She is very concerned about this, since someone should be held accountable if there was sensitive information posted on the website. 

Where can Stephanie go to see past versions and pages of a website? 

A. She should go to the web page Samspade.org to see web pages that might no longer be on the website 

B. If Stephanie navigates to Search.com; she will see old versions of the company website 

C. Stephanie can go to Archive.org to see past versions of the company website 

D. AddressPast.com would have any web pages that are no longer hosted on the company's website 

Answer: C