Q111. According to the CEH methodology, what is the next step to be performed after footprinting? 

A. Enumeration 

B. Scanning 

C. System Hacking 

D. Social Engineering 

E. Expanding Influence 

Answer:

Explanation: Once footprinting has been completed, scanning should be attempted next. 

Scanning should take place on two distinct levels: network and host. 


Q112. You just purchased the latest DELL computer, which comes pre-installed with Windows XP, McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to your cable modem and start using the computer immediately. 

Windows is dangerously insecure when unpacked from the box, and there are a few things that you must do before you use it. 

A. New Installation of Windows Should be patched by installation the latest service packs and hotfixes 

B. Enable “guest” account 

C. Install a personal firewall and lock down unused ports from connecting to your computer 

D. Install the latest signatures for Antivirus software 

E. Configure “Windows Update” to automatic 

F. Create a non-admin user with a complex password and login to this account 

Answer: ACDEF

Explanation: The guest account is a possible vulnerability to your system so you should not enable it unless needed. Otherwise you should perform all other actions mentioned in order to have a secure system. 

Topic 23, Mixed Questions 

566. One of the better features of NetWare is the use of packet signature that includes cryptographic signatures. The packet signature mechanism has four levels from 0 to 3. 

In the list below which of the choices represent the level that forces NetWare to sign all packets? 

A. 0 (zero) 

B. 1 

C. 2 

D. 3 

Answer: D

Explanation: 0Server does not sign packets (regardless of the client level). 

1Server signs packets if the client is capable of signing (client level is 2 or higher). 

2Server signs packets if the client is capable of signing (client level is 1 or higher). 

3Server signs packets and requires all clients to sign packets or logging in will fail. 


Q113. Carl has successfully compromised a web server from behind a firewall by exploiting a vulnerability in the web server program. He wants to proceed by installing a backdoor program. However, he is aware that not all inbound ports on the firewall are in the open state. 

From the list given below, identify the port that is most likely to be open and allowed to reach the server that Carl has just compromised. 

A. 53 

B. 110 

C. 25 

D. 69 

Answer: A

Explanation: Port 53 is used by DNS and is almost always open, the problem is often that the port is opened for the hole world and not only for outside DNS servers. 


Q114. What does an ICMP (Code 13) message normally indicates? 

A. It indicates that the destination host is unreachable 

B. It indicates to the host that the datagram which triggered the source quench message will need to be re-sent 

C. It indicates that the packet has been administratively dropped in transit 

D. It is a request to the host to cut back the rate at which it is sending traffic to the Internet destination 

Answer: C

Explanation: CODE 13 and type 3 is destination unreachable due to communication administratively prohibited by filtering hence maybe they meant "code 13", therefore would be C). 

Note:A - Type 3B - Type 4C - Type 3 Code 13D - Typ4 4 


Q115. Study the snort rule given below: 

From the options below, choose the exploit against which this rule applies. 

A. WebDav 

B. SQL Slammer 

C. MS Blaster 

D. MyDoom 

Answer: C

Explanation: MS Blaster scans the Internet for computers that are vulnerable to its attack. Once found, it tries to enter the system through the port 135 to create a buffer overflow. TCP ports 139 and 445 may also provide attack vectors. 


Q116. Your computer is infected by E-mail tracking and spying Trojan. This Trojan infects the computer with a single file - emos.sys 

Which step would you perform to detect this type of Trojan? 

A. Scan for suspicious startup programs using msconfig 

B. Scan for suspicious network activities using Wireshark 

C. Scan for suspicious device drivers in c:\windows\system32\drivers 

D. Scan for suspicious open ports using netstat 

Answer: C


Q117. Steven is the senior network administrator for Onkton Incorporated, an oil well drilling company in Oklahoma City. Steven and his team of IT technicians are in charge of keeping inventory for the entire company; including computers, software, and oil well equipment. To keep track of everything, Steven has decided to use RFID tags on their entire inventory so they can be scanned with either a wireless scanner or a handheld scanner. These RFID tags hold as much information as possible about the equipment they are attached to. When Steven purchased these tags, he made sure they were as state of the art as possible. One feature he really liked was the ability to disable RFID tags if necessary. This comes in very handy when the company actually sells oil drilling equipment to other companies. All Steven has to do is disable the RFID tag on the sold equipment and it cannot give up any information that was previously stored on it. 

What technology allows Steven to disable the RFID tags once they are no longer needed? 

A. Newer RFID tags can be disabled by using Terminator Switches built into the chips 

B. RFID Kill Switches built into the chips enable Steven to disable them 

C. The company's RFID tags can be disabled by Steven using Replaceable ROM technology 

D. The technology used to disable an RFIP chip after it is no longer needed, or possibly stolen, is called RSA Blocking 

Answer: D

Explanation: http://www.rsa.com/rsalabs/node.asp?id=2060 


Q118. An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the price? 

A. By using SQL injection 

B. By using cross site scripting 

C. By changing hidden form values in a local copy of the web page 

D. There is no way the attacker could do this without directly compromising either the web server or the database 

Answer: C

Explanation: Changing hidden form values is possible when a web site is poorly built and is trusting the visitors computer to submit vital data, like the price of a product, to the database. 


Q119. You visit a website to retrieve the listing of a company's staff members. But you can not find it on the website. You know the listing was certainly present one year before. How can you retrieve information from the outdated website? 

A. Through Google searching cached files 

B. Through Archive.org 

C. Download the website and crawl it 

D. Visit customers' and prtners' websites 

Answer: B

Explanation: Archive.org mirrors websites and categorizes them by date and month depending on the crawl time. Archive.org dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the website is incorrect because that's the same as what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, archive.org 


Q120. John wishes to install a new application onto his Windows 2000 server. 

He wants to ensure that any application he uses has not been Trojaned. 

What can he do to help ensure this? 

A. Compare the file's MD5 signature with the one published on the distribution media 

B. Obtain the application via SSL 

C. Compare the file's virus signature with the one published on the distribution media 

D. Obtain the application from a CD-ROM disc 

Answer: A

Explanation: MD5 was developed by Professor Ronald L. Rivest of MIT. What it does, to quote the executive summary of rfc1321, is: 

[The MD5 algorithm] takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD5 algorithm is intended for digital signature applications, where a large file must be "compressed" in a secure manner before being encrypted with a private (secret) key under a public-key cryptosystem such as RSA. 

In essence, MD5 is a way to verify data integrity, and is much more reliable than checksum and many other commonly used methods.