Highest Quality of 312-50 book materials and practice for EC-Council certification for IT engineers, Real Success Guaranteed with Updated 312-50 pdf dumps vce Materials. 100% PASS Ethical Hacking and Countermeasures (CEHv6) exam Today!

2021 Apr 312-50 free exam questions

Q391. Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system. Which TCP and UDP ports must you filter to check null sessions on your network? 

A. 137 and 139 

B. 137 and 443 

C. 139 and 443 

D. 139 and 445 

Answer:

Explanation: NULL sessions take advantage of “features” in the SMB (Server Message Block) protocol that exist primarily for trust relationships. You can establish a NULL session with a Windows host by logging on with a NULL user name and password. Primarily the following ports are vulnerable if they are accessible: 139 TCP NETBIOS Session Service 139 UDP NETBIOS Session Service 445 TCP SMB/CIFS 


Q392. What is the expected result of the following exploit? 

A. Opens up a telnet listener that requires no username or password. 

B. Create a FTP server with write permissions enabled. 

C. Creates a share called “sasfile” on the target system. 

D. Creates an account with a user name of Anonymous and a password of noone@nowhere.com. 

Answer: A

Explanation: The script being depicted is in perl (both msadc.pl and the script their using as a wrapper) -- $port, $your, $user, $pass, $host are variables that hold the port # of a DNS server, an IP, username, and FTP password. $host is set to argument variable 0 (which means the string typed directly after the command). Essentially what happens is it connects to an FTP server and downloads nc.exe (the TCP/IP swiss-army knife -- netcat) and uses nc to open a TCP port spawning cmd.exe (cmd.exe is the Win32 DOS shell on NT/2000/2003/XP), cmd.exe when spawned requires NO username or password and has the permissions of the username it is being executed as (probably guest in this instance, although it could be administrator). The #'s in the script means the text following is a comment, notice the last line in particular, if the # was removed the script would spawn a connection to itself, the host system it was running on. 


Q393. SNMP is a connectionless protocol that uses UDP instead of TCP packets? (True or False) 

A. True 

B. False 

Answer: A

Explanation: TCP and UDP provide transport services. But UDP was preferred. This is due to TCP characteristics, it is a complicate protocol and it consume to many memory and CPU resources. Where as UDP is easy to build and run. Into devices (repeaters and modems) vendors have built simple version of IP and UDP. 


Q394. Bob has been hired to perform a penetration test on ABC.com. He begins by looking at IP address ranges owned by the company and details of domain name registration. He then goes to News Groups and financial web sites to see if they are leaking any sensitive information of have any technical details online. 

Within the context of penetration testing methodology, what phase is Bob involved with? 

A. Passive information gathering 

B. Active information gathering 

C. Attack phase 

D. Vulnerability Mapping 

Answer: A

Explanation: He is gathering information and as long as he doesn’t make contact with any of the targets systems he is considered gathering this information in a passive mode. 


Q395. In order to attack wireless network, you put up an access point and override the signal of the real access point. And when users send authentication data, you are able to capture it. What kind of attack is this? 

A. WEP Attack 

B. Drive by hacking 

C. Rogue Access Point Attack 

D. Unauthorized Access Point Attack 

Answer: C

Explanation: A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network management or has been created to allow a cracker to conduct a man-in-the-middle attack. 


Latest 312-50 torrent:

Q396. StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use _____ defense against buffer overflow attacks. 

A. Canary 

B. Hex editing 

C. Format checking 

D. Non-executing stack 

Answer: A

Explanation: Canaries or canary words are known values that are placed between a buffer and control data on the stack to monitor buffer overflows. When the buffer overflows, it will clobber the canary, making the overflow evident. This is a reference to the historic practice of using canaries in coal mines, since they would be affected by toxic gases earlier than the miners, thus providing a biological warning system. 


Q397. Vulnerability scanners are automated tools that are used to identify vulnerabilities and misconfigurations of hosts. They also provide information regarding mitigating discovered vulnerabilities. 

Which of the following statements is incorrect? 

A. Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned. 

B. Vulnerability scanners can help identify out-of-date software versions, missing patches, or system upgrades 

C. They can validate compliance with or deviations from the organization's security policy 

D. Vulnerability scanners can identify weakness and automatically fix and patch the vulnerabilities without user intervention 

Answer: D


Q398. Bob has a good understanding of cryptography, having worked with it for many years. Cryptography is used to secure data from specific threat, but it does not secure the application from coding errors. It can provide data privacy, integrity and enable strong authentication but it cannot mitigate programming errors. 

What is a good example of a programming error that Bob can use to illustrate to the management that encryption will not address all of their security concerns? 

A. Bob can explain that a random generator can be used to derive cryptographic keys but it uses a weak seed value and it is a form of programming error. 

B. Bob can explain that by using passwords to derive cryptographic keys it is a form of a programming error. 

C. Bob can explain that a buffer overflow is an example of programming error and it is a common mistake associated with poor programming technique. 

D. Bob can explain that by using a weak key management technique it is a form of programming error. 

Answer: C

Explanation: A buffer overflow occurs when you write a set of values (usually a string of characters) into a fixed length buffer and write at least one value outside that buffer's boundaries (usually past its end). A buffer overflow can occur when reading input from the user into a buffer, but it can also occur during other kinds of processing in a program. Technically, a buffer overflow is a problem with the program's internal implementation. 


Q399. What port number is used by Kerberos protocol? 

A. 44 

B. 88 

C. 419 

D. 487 

Answer:

Explanation: Kerberos traffic uses UDP/TCP protocol source and destination port 88. 


Q400. Perimeter testing means determining exactly what your firewall blocks and what it allows. To conduct a good test, you can spoof source IP addresses and source ports. Which of the following command results in packets that will appear to originate from the system at 10.8.8.8? Such a packet is useful for determining whether the firewall is allowing random packets in or out of your network. 

A. hping3 -T 10.8.8.8 -S netbios -c 2 -p 80 

B. hping3 -Y 10.8.8.8 -S windows -c 2 -p 80 

C. hping3 -O 10.8.8.8 -S server -c 2 -p 80 

D. hping3 -a 10.8.8.8 -S springfield -c 2 -p 80 

Answer: D