Course/Tutorial CEH V 12 EXAM DUMP -5 (1 Viewer)

Currently reading:
 Course/Tutorial CEH V 12 EXAM DUMP -5 (1 Viewer)

Tutorial or Course of anything
Recently searched:

karan4321

Member
LV
2
Joined
Oct 18, 2023
Threads
11
Likes
10
Awards
6
Credits
11,887©
Cash
0$

NEW QUESTION: 51

What does the -oX flag do in an Nmap scan?

A. Perform an eXpress scan

B. Output the results in truncated format to the screen

C. Output the results in XML format to a file

D. Perform an Xmas scan

Answer: (SHOW ANSWER)


-oX <filespec> - Requests that XML output be directed to the given filename.

Incorrect answers:

Run an express scan https://nmap.org/book/man-port-specification.html

There is no express scan in Nmap, but there is a fast scan.

-F (Fast (limited port) scan)

Specifies that you wish to scan fewer ports than the default. Normally Nmap scans the most

common 1,000 ports for each scanned protocol. With -F, this is reduced to 100.

Or we can influence the intensity (and speed) of the scan with the -T flag.


-T paranoid|sneaky|polite|normal|aggressive|insane

Output the results in truncated format to the screen https://nmap.org/book/man-output.html

-oG <filespec> (grepable output)

It is a simple format that lists each host on one line and can be trivially searched and parsed with

standard Unix tools such as grep, awk, cut, sed, diff, and Perl.

Run a Xmas scan https://nmap.org/book/man-port-scanning-techniques.html Xmas scan (-sX)

Sets the FIN, PSH, and URG flags, lighting the packet up like a Christmas tree.

NEW QUESTION: 52

In both pharming and phishing attacks, an attacker can create websites that look similar to

legitimate sites with the intent of collecting personal identifiable information from its victims.

What is the difference between pharming and phishing attacks?

A. Both pharming and phishing attacks are identical

B. In a pharming attack, a victim is redirected to a fake website by modifying their host

configuration file or by exploiting vulnerabilities in DNS. In a phishing attack, an attacker provides

the victim with a URL that is either misspelled or looks similar to the actual websites domain

name

C. In a phishing attack, a victim is redirected to a fake website by modifying their host

configuration file or by exploiting vulnerabilities in DNS. In a pharming attack, an attacker provides

the victim with a URL that is either misspelled or looks very similar to the actual websites domain

name

D. Both pharming and phishing attacks are purely technical and are not considered forms of

social engineering

Answer: (SHOW ANSWER)

NEW QUESTION: 53


Allen, a professional pen tester, was hired by xpertTech solutWns to perform an attack simulation

on the organization's network resources. To perform the attack, he took advantage of the

NetBIOS API and targeted the NetBIOS service. B/enumerating NetBIOS, he found that port 139

was open and could see the resources that could be accessed or viewed on a remote system. He

came across many NetBIOS codes during enumeration.

identify the NetBIOS code used for obtaining the messenger service running for the logged-in

user?

A. <1B>

B. <00>

C. <03>

D. <20>

Answer: (SHOW ANSWER)

<03>

Windows Messenger administration

Courier administration is an organization based framework notice Windows administration by

Microsoft that was remembered for some prior forms of Microsoft Windows.

This resigned innovation, despite the fact that it has a comparable name, isn't connected in any

capacity to the later, Internet-based Microsoft Messenger administration for texting or to Windows

Messenger and Windows Live Messenger (earlier named MSN Messenger) customer

programming.

The Messenger Service was initially intended for use by framework managers to tell Windows

clients about their networks.[1] It has been utilized malevolently to introduce spring up

commercials to clients over the Internet (by utilizing mass-informing frameworks which sent an

ideal message to a predetermined scope of IP addresses). Despite the fact that Windows XP

incorporates a firewall, it isn't empowered naturally. Along these lines, numerous clients got such

messages. Because of this maltreatment, the Messenger Service has been debilitated as a

matter of course in Windows XP Service Pack 2.

NEW QUESTION: 54

Why would you consider sending an email to an address that you know does not exist within the

company you are performing a Penetration Test for?

A. To determine who is the holder of the root account

B. To create needless SPAM

C. To perform a DoS

D. To test for virus protection

E. To illicit a response back that will reveal information about email servers and how they treat

undeliverable mail

Answer: (SHOW ANSWER)

NEW QUESTION: 55


You have gained physical access to a Windows 2008 R2 server which has an accessible disc

drive. When you attempt to boot the server and log in, you are unable to guess the password. In

your toolkit, you have an Ubuntu 9.10 Linux LiveCD. Which Linux-based tool can change any

user's password or activate disabled Windows accounts?

A. John the Ripper

B. SET

C. CHNTPW

D. Cain & Abel

Answer: (SHOW ANSWER)

NEW QUESTION: 56


Techno Security Inc. recently hired John as a penetration tester. He was tasked with identifying

open ports in the target network and determining whether the ports are online and any firewall

rule sets are encountered. John decided to perform a TCP SYN ping scan on the target network.

Which of the following Nmap commands must John use to perform the TCP SYN ping scan?

A. nmap -sn -pp < target ip address >

B. nmap -sn -PO < target IP address >

C. nmap -sn -PS < target IP address >

D. nmap -sn -PA < target IP address >

Answer: (SHOW ANSWER)


NEW QUESTION: 57

Peter is surfing the internet looking for information about DX Company. Which hacking process is

Peter doing?

A. Enumeration

B. System Hacking

C. Scanning

D. Footprinting

Answer: (SHOW ANSWER)

NEW QUESTION: 58


You have the SOA presented below in your Zone.

Your secondary servers have not been able to contact your primary server to synchronize

information. How long will the secondary servers attempt to contact the primary server before it

considers that zone is dead and stops responding to queries?

collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)

A. One week

B. One hour

C. One month

D. One day

Answer: (SHOW ANSWER)

NEW QUESTION: 59


Widespread fraud ac Enron. WorldCom, and Tyco led to the creation of a law that was designed

to improve the accuracy and accountability of corporate disclosures. It covers accounting firms

and third parties that provide financial services to some organizations and came into effect in

2002. This law is known by what acronym?

A. Fed RAMP

B. PCIDSS

C. SOX

D. HIPAA

Answer: (SHOW ANSWER)

The Sarbanes-Oxley Act of 2002 could be a law the U.S. Congress passed on July thirty of that

year to assist defend investors from fallacious money coverage by companies.Also called the

SOX Act of 2002 and also the company Responsibility Act of 2002, it mandated strict reforms to

existing securities rules and obligatory powerful new penalties on law breakers.

The Sarbanes-Oxley law Act of 2002 came in response to money scandals within the early 2000s

involving in public listed corporations like Enron Corporation, Tyco International plc, and

WorldCom. The high-profile frauds cask capitalist confidence within the trustiness of company

money statements Associate in Nursingd light-emitting diode several to demand an overhaul of

decades-old restrictive standards.

NEW QUESTION: 60

A.
nmap -Pn -sT --scan-delay 1s --max-parallelism 1 -p < Port List > < Target IP >

B. nmap -Pn -sU -p 44818 --script enip-info < Target IP >

C. nmap -Pn -sT -p 46824 < Target IP >

D. nmap -Pn -sT -p 102 --script s7-info < Target IP >

Answer: (SHOW ANSWER)


Example Usage enip-info:

- nmap --script enip-info -sU -p 44818 <host>

This NSE script is used to send a EtherNet/IP packet to a remote device that has TCP 44818

open. The script will send a Request Identity Packet and once a response is received, it validates

that it was a proper response to the command that was sent, and then will parse out the data.

Information that is parsed includes Device Type, Vendor ID, Product name, Serial Number,

Product code, Revision Number, status, state, as well as the Device IP.

This script was written based of information collected by using the the Wireshark dissector for

CIP, and EtherNet/IP, The original information was collected by running a modified version of the

ethernetip.py script (https://github.com/paperwork/pyenip)

NEW QUESTION: 61

Security administrator John Smith has noticed abnormal amounts of traffic coming from local

computers at night. Upon reviewing, he finds that user data have been exfilltrated by an attacker.

AV tools are unable to find any malicious software, and the IDS/IPS has not reported on any nonwhitelisted

programs, what type of malware did the attacker use to bypass the company's

application whitelisting?

A. Phishing malware

B. Zero-day malware

C. File-less malware

D. Logic bomb malware

Answer: C (LEAVE A REPLY)


html

Valid 312-50v12 Dumps shared by PassTestKing.com for Helping Passing 312-50v12 Exam!

PassTestKing.com now offer the newest 312-50v12 exam dumps, the PassTestKing.com

312-50v12 exam questions have been updated and answers have been corrected get the

newest PassTestKing.com 312-50v12 dumps with Test Engine here:

https://www.passtestking.com/ECCouncil/312-50v12-practice-exam-dumps.html (505 Q&As

Dumps, 35%OFF Special Discount Code: freecram)

NEW QUESTION: 62

Which of the following statements is TRUE?

A. Packet Sniffers operate on the Layer 1 of the OSI model.

B. Packet Sniffers operate on Layer 2 of the OSI model.

C. Packet Sniffers operate on Layer 3 of the OSI model.

D. Packet Sniffers operate on both Layer 2 & Layer 3 of the OSI model.

Answer: B (LEAVE A REPLY)

NEW QUESTION: 63


A hacker has successfully infected an internet-facing server which he will then use to send junk

mail, take part in coordinated attacks, or host junk email content. Which sort of trojan infects this

server?

A. Botnet Trojan

B. Ransomware Trojans

C. Banking Trojans

D. Turtle Trojans

Answer: (SHOW ANSWER)

NEW QUESTION: 64


What is the algorithm used by LM for Windows2000 SAM?

A. DES

B. MD4

C. SSL

D. SHA

Answer: (SHOW ANSWER)

NEW QUESTION: 65


While examining audit logs, you discover that people are able to telnet into the SMTP server on

port 25. You would like to block this, though you do not see any evidence of an attack or other

wrong doing. However, you are concerned about affecting the normal functionality of the email

server. From the following options choose how best you can achieve this objective?

A. Block port 25 at the firewall.

B. Force all connections to use a username and password.

C. Switch from Windows Exchange to UNIX Sendmail.

D. Shut off the SMTP service on the server.

E. None of the above.

Answer: (SHOW ANSWER)

NEW QUESTION: 66


Which of the following LM hashes represent a password of less than 8 characters? (Choose two.)

A. 44EFCE164AB921CQAAD3B435B51404EE

B. E52CAC67419A9A224A3B108F3FA6CB6D

C. CEC52EB9C8E3455DC2265B23734E0DAC

D. BA810DBA98995F1817306D272A9441BB

E. B757BF5C0D87772FAAD3B435B51404EE

F. 0182BD0BD4444BF836077A718CCDF409

Answer: (SHOW ANSWER)

NEW QUESTION: 67


Tony wants to integrate a 128-bit symmetric block cipher with key sizes of 128,192, or 256 bits

into a software program, which involves 32 rounds of computational operations that include

substitution and permutation operations on four 32-bit word blocks using 8-variable S-boxes with

4-bit entry and 4-bit exit. Which of the following algorithms includes all the above features and can

be integrated by Tony into the software program?

A. serpent

B. CAST-128

C. TEA

D. RC5

Answer: (SHOW ANSWER)

NEW QUESTION: 68


which type of virus can change its own code and then cipher itself multiple times as it replicates?

A. Stealth virus

B. Tunneling virus

C. Cavity virus

D. Encryption virus

Answer: (SHOW ANSWER)

A stealth virus may be a sort of virus malware that contains sophisticated means of avoiding

detection by antivirus software. After it manages to urge into the now-infected machine a stealth

viruses hides itself by continually renaming and moving itself round the disc. Like other viruses, a

stealth virus can take hold of the many parts of one's PC. When taking control of the PC and

performing tasks, antivirus programs can detect it, but a stealth virus sees that coming and can

rename then copy itself to a special drive or area on the disc, before the antivirus software. Once

moved and renamed a stealth virus will usually replace the detected 'infected' file with a clean file

that doesn't trigger anti-virus detection. It's a never-ending game of cat and mouse. The intelligent

architecture of this sort of virus about guarantees it's impossible to completely rid oneself of it

once infected. One would need to completely wipe the pc and rebuild it from scratch to completely

eradicate the presence of a stealth virus. Using regularly-updated antivirus software can reduce

risk, but, as we all know, antivirus software is additionally caught in an endless cycle of finding

new threats and protecting against them.


NEW QUESTION: 69

Which of the following allows attackers to draw a map or outline the target organization's network

infrastructure to know about the actual environment that they are going to hack.

A. Malware analysis

B. Enumeration

C. Scanning networks

D. Vulnerability analysis

Answer: (SHOW ANSWER)

NEW QUESTION: 70

A.
DNS cache snooping

B. DNS cache poisoning

C. DNS zone walking

D. DNS SEC zone walking

Answer: (SHOW ANSWER)

NEW QUESTION: 71


John, a professional hacker, targeted an organization that uses LDAP for accessing distributed

directory services. He used an automated tool to anonymously query the IDAP service for

sensitive information such as usernames. addresses, departmental details, and server names to

launch further attacks on the target organization.

What is the tool employed by John to gather information from the IDAP service?

A. jxplorer

B. Zabasearch

C. EarthExplorer

D. Ike-scan

Answer: (SHOW ANSWER)

JXplorer could be a cross platform LDAP browser and editor. it's a standards compliant general

purpose LDAP client which will be used to search, scan and edit any commonplace LDAP

directory, or any directory service with an LDAP or DSML interface.

It is extremely flexible and can be extended and custom in a very number of the way. JXplorer is

written in java, and also the source code and source code build system ar obtainable via svn or

as a packaged build for users who wish to experiment or any develop the program.

JX is is available in 2 versions; the free open source version under an OSI Apache two style

licence, or within the JXWorkBench Enterprise bundle with inbuilt reporting, administrative and

security tools.

JX has been through a number of different versions since its creation in 1999; the foremost recent

stable release is version 3.3.1, the August 2013 release.

JXplorer could be a absolutely useful LDAP consumer with advanced security integration and

support for the harder and obscure elements of the LDAP protocol. it's been tested on Windows,

Solaris, linux and OSX, packages are obtainable for HPUX, AIX, BSD and it should run on any

java supporting OS.

NEW QUESTION: 72

Which of the following viruses tries to hide from anti-virus programs by actively altering and

corrupting the chosen service call interruptions when they are being run?

A. Stealth/Tunneling virus

B. Macro virus

C. Polymorphic virus

D. Cavity virus

Answer: (SHOW ANSWER)

NEW QUESTION: 73


Samuel, a professional hacker, monitored and Intercepted already established traffic between

Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with

Bob's IP address to the host machine. The host machine responded with <| packet having an

Incremented ISN. Consequently. Bob's connection got hung, and Samuel was able to

communicate with the host machine on behalf of Bob. What is the type of attack performed by

Samuel in the above scenario?

A. UDP hijacking

B. Blind hijacking

C. TCP/IP hacking

D. Forbidden attack

Answer: (SHOW ANSWER)

A TCP/IP hijack is an attack that spoofs a server into thinking it's talking with a sound client, once

actually it's communication with an assaulter that has condemned (or hijacked) the tcp session.

Assume that the client has administrator-level privileges, which the attacker needs to steal that

authority so as to form a brand new account with root-level access of the server to be used

afterward. A tcp Hijacking is sort of a two-phased man-in-the-middle attack. The man-in-themiddle

assaulter lurks within the circuit between a shopper and a server so as to work out what

port and sequence numbers are being employed for the conversation.

First, the attacker knocks out the client with an attack, like Ping of Death, or ties it up with some

reasonably ICMP storm. This renders the client unable to transmit any packets to the server.

Then, with the client crashed, the attacker assumes the client's identity so as to talk with the

server. By this suggests, the attacker gains administrator-level access to the server.

One of the most effective means of preventing a hijack attack is to want a secret, that's a shared

secret between the shopper and also the server. looking on the strength of security desired, the

key may be used for random exchanges. this is often once a client and server periodically

challenge each other, or it will occur with each exchange, like Kerberos.

NEW QUESTION: 74

An attacker identified that a user and an access point are both compatible with WPA2 and WPA3

encryption. The attacker installed a rogue access point with only WPA2 compatibility in the vicinity

and forced the victim to go through the WPA2 four-way handshake to get connected. After the

connection was established, the attacker used automated tools to crack WPA2-encrypted

messages. What is the attack performed in the above scenario?

A. Downgrade security attack

B. Cache-based attack

C. Timing-based attack

D. Side-channel attack

Answer: (SHOW ANSWER)

NEW QUESTION: 75


What is the proper response for a NULL scan if the port is closed?

A. ACK

B. SYN

C. RST

D. No response

E. FIN

F. PSH

Answer: (SHOW ANSWER)

NEW QUESTION: 76


One of your team members has asked you to analyze the following SOA record.

What is the TTL? Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600 3600

604800 2400.)

A. 3600

B. 2400

C. 200303028

D. 604800

E. 4800

F. 60

Answer: (SHOW ANSWER)

Valid 312-50v12 Dumps
shared by PassTestKing.com for Helping Passing 312-50v12 Exam!

PassTestKing.com now offer the newest 312-50v12 exam dumps, the PassTestKing.com

312-50v12 exam questions have been updated and answers have been corrected get the

newest PassTestKing.com 312-50v12 dumps with Test Engine here:

https://www.passtestking.com/ECCouncil/312-50v12-practice-exam-dumps.html (505 Q&As

Dumps, 35%OFF Special Discount Code: freecram)

NEW QUESTION: 77

Johnson, an attacker, performed online research for the contact details of reputed cybersecurity

firms. He found the contact number of sibertech.org and dialed the number, claiming himself to

represent a technical support team from a vendor. He warned that a specific server is about to be

compromised and requested sibertech.org to follow the provided instructions. Consequently, he

prompted the victim to execute unusual commands and install malicious files, which were then

used to collect and pass critical Information to Johnson's machine. What is the social engineering

technique Steve employed in the above scenario?

A. Quid pro quo

B. Diversion theft

C. Elicitation

D. Phishing

Answer: (SHOW ANSWER)


This Social Engineering scam involves an exchange of information that can benefit both the victim

and the trickster. Scammers would make the prey believe that a fair exchange will be present

between both sides, but in reality, only the fraudster stands to benefit, leaving the victim hanging

on to nothing. An example of a Quid Pro Quo is a scammer pretending to be an IT support

technician. The con artist asks for the login credentials of the company's computer saying that the

company is going to receive technical support in return. Once the victim has provided the

credentials, the scammer now has control over the company's computer and may possibly load

malware or steal personal information that can be a motive to commit identity theft.

"A quid pro quo attack (aka something for something" attack) is a variant of baiting. Instead of

baiting a target with the promise of a good, a quid pro quo attack promises a service or a benefit

based on the execution of a specific action." https://resources.infosecinstitute.com/topic/commonsocial-

engineering-attacks/#:~:text=A%20quid%20pro%20quo%20attack,execution%20of%20a

%20specific%20action.

NEW QUESTION: 78

John is an incident handler at a financial institution. His steps in a recent incident are not up to the

standards of the company. John frequently forgets some steps and procedures while handling

responses as they are very stressful to perform. Which of the following actions should John take

to overcome this problem with the least administrative effort?

A. Increase his technical skills.

B. Create an incident checklist.

C. Read the incident manual every time it occurs.

D. Select someone else to check the procedures.

Answer: (SHOW ANSWER)

NEW QUESTION: 79


In the context of password security, a simple dictionary attack involves loading a dictionary file (a

text file full of dictionary words) into a cracking application such as L0phtCrack or John the

Ripper, and running it against user accounts located by the application. The larger the word and

word fragment selection, the more effective the dictionary attack is. The brute force method is the

most inclusive, although slow. It usually tries every possible letter and number combination in its

automated exploration. If you would use both brute force and dictionary methods combined

together to have variation of words, what would you call such an attack?

A. Hybrid

B. BruteDics

C. Full Blown

D. Thorough

Answer: (SHOW ANSWER)

NEW QUESTION: 80

A.
John the Ripper

B. THC-Hydra

C. Hashcat

D. netcat

Answer: (SHOW ANSWER)

NEW QUESTION: 81


When conducting a penetration test, it is crucial to use all means to get all available information

about the target network. One of the ways to do that is by sniffing the network. Which of the

following cannot be performed by the passive network sniffing?

A. Identifying operating systems, services, protocols and devices

B. Capturing a network traffic for further analysis

C. Modifying and replaying captured network traffic

D. Collecting unencrypted information about usernames and passwords

Answer: (SHOW ANSWER)

NEW QUESTION: 82


Harper, a software engineer, is developing an email application. To ensure the confidentiality of

email messages. Harper uses a symmetric-key block cipher having a classical 12- or 16-round

Feistel network with a block size of 64 bits for encryption, which includes large 8 x 32-bit S-boxes

(S1, S2, S3, S4) based on bent functions, modular addition and subtraction, key-dependent

rotation, and XOR operations. This cipher also uses a masking key(Km1)and a rotation key (Kr1)

for performing its functions. What is the algorithm employed by Harper to secure the email

messages?

A. AES

B. GOST block cipher

C. CAST-128

D. DES

Answer: (SHOW ANSWER)

NEW QUESTION: 83


This type of injection attack does not show any error message. It is difficult to exploit as it returns

information when the application is given SQL payloads that elicit a true or false response from

the server. By observing the response, an attacker can extract sensitive information. What type of

attack is this?

A. Blind SQL injection

B. Union SQL injection

C. Error-based SQL injection

D. Time-based SQL injection

Answer: A (LEAVE A REPLY)

NEW QUESTION: 84


Bella, a security professional working at an it firm, finds that a security breach has occurred while

transferring important files. Sensitive data, employee usernames. and passwords are shared In

plaintext, paving the way for hackers 10 perform successful session hijacking. To address this

situation. Bella Implemented a protocol that sends data using encryption and digital certificates.

Which of the following protocols Is used by Bella?

A. FTP

B. HTTPS

C. FTPS

D. IP

Answer: (SHOW ANSWER)

The File Transfer Protocol (FTP) is a standard organization convention utilized for the exchange

of PC records from a worker to a customer on a PC organization. FTP is based on a customer

worker model engineering utilizing separate control and information associations between the

customer and the server.[1] FTP clients may validate themselves with an unmistakable book signin

convention, ordinarily as a username and secret key, however can interface namelessly if the

worker is designed to permit it. For secure transmission that ensures the username and secret

phrase, and scrambles the substance, FTP is frequently made sure about with SSL/TLS (FTPS)

or supplanted with SSH File Transfer Protocol (SFTP).

The primary FTP customer applications were order line programs created prior to working

frameworks had graphical UIs, are as yet dispatched with most Windows, Unix, and Linux

working systems.[2][3] Many FTP customers and mechanization utilities have since been created

for working areas, workers, cell phones, and equipment, and FTP has been fused into profitability

applications, for example, HTML editors.

NEW QUESTION: 85

You are a penetration tester working to test the user awareness of the employees of the client

xyz. You harvested two employees' emails from some public sources and are creating a clientside

backdoor to send it to the employees via email. Which stage of the cyber kill chain are you

at?

A. Reconnaissance

B. Command and control

C. Weaponization

D. Exploitation

Answer: (SHOW ANSWER)

Weaponization

The adversary analyzes the data collected in the previous stage to identify the vulnerabilities and

techniques that can exploit and gain unauthorized access to the target organization. Based on the

vulnerabilities identified during analysis, the adversary selects or creates a tailored deliverable

malicious payload (remote-access malware weapon) using an exploit and a backdoor to send it to

the victim. An adversary may target specific network devices, operating systems, endpoint

devices, or even individuals within the organization to carry out their attack. For example, the

adversary may send a phishing email to an employee of the target organization, which may

include a malicious attachment such as a virus or worm that, when downloaded, installs a

backdoor on the system that allows remote access to the adversary. The following are the

activities of the adversary: o Identifying appropriate malware payload based on the analysis o

Creating a new malware payload or selecting, reusing, modifying the available malware payloads

based on the identified vulnerability o Creating a phishing email campaign o Leveraging exploit

kits and botnets


The Cyber Kill Chain consists of 7 steps: Reconnaissance, weaponization, delivery, exploitation,

installation, command and control, and finally, actions on objectives. Below you can find detailed

information on each.

1. Reconnaissance: In this step, the attacker/intruder chooses their target. Then they conduct indepth

research on this target to identify its vulnerabilities that can be exploited.

2. Weaponization: In this step, the intruder creates a malware weapon like a virus, worm, or such

to exploit the target's vulnerabilities. Depending on the target and the purpose of the attacker, this

malware can exploit new, undetected vulnerabilities (also known as the zero-day exploits) or

focus on a combination of different vulnerabilities.

3. Delivery: This step involves transmitting the weapon to the target. The intruder/attacker can

employ different USB drives, e-mail attachments, and websites for this purpose.

4. Exploitation: In this step, the malware starts the action. The program code of the malware is

triggered to exploit the target's vulnerability/vulnerabilities.

5. Installation: In this step, the malware installs an access point for the intruder/attacker. This

access point is also known as the backdoor.

6. Command and Control: The malware gives the intruder/attacker access to the network/system.

7. Actions on Objective: Once the attacker/intruder gains persistent access, they finally take

action to fulfill their purposes, such as encryption for ransom, data exfiltration, or even data

destruction.

NEW QUESTION: 86

Which DNS resource record can indicate how long any "DNS poisoning" could last?

A. SOA

B. TIMEOUT

C. MX

D. NS

Answer: (SHOW ANSWER)

NEW QUESTION: 87


Peter, a Network Administrator, has come to you looking for advice on a tool that would help him

perform SNMP enquires over the network.

Which of these tools would do the SNMP enumeration he is looking for? Select the best answers.

A. NMap

B. SNMPUtil

C. Solarwinds IP Network Browser

D. SNScan

E. SNMPScan

Answer: (SHOW ANSWER)

NEW QUESTION: 88


Which type of security feature stops vehicles from crashing through the doors of a building?

A. Receptionist

B. Bollards

C. Turnstile

D. Mantrap

Answer: (SHOW ANSWER)

NEW QUESTION: 89


Which of the following antennas is commonly used in communications for a frequency band of 10

MHz to VHF and UHF?

A. Parabolic grid antenna

B. Yagi antenna

C. Dipole antenna

D. Omnidirectional antenna

Answer: (SHOW ANSWER)

NEW QUESTION: 90

A.
tcpsplice

B. Burp

C. Hydra

D. Whisker

Answer: (SHOW ANSWER)

«Many IDS reassemble communication streams; hence, if a packet is not received within a

reasonable period, many IDS stop reassembling and handling that stream. If the application

under attack keeps a session active for a longer time than that spent by the IDS on reassembling

it, the IDS will stop. As a result, any session after the IDS stops reassembling the sessions will be

susceptible to malicious data theft by attackers. The IDS will not log any attack attempt after a

successful splicing attack. Attackers can use tools such as Nessus for session splicing attacks.»

Did you know that the EC-Council exam shows how well you know their official book? So, there is

no "Whisker" in it. In the chapter "Evading IDS" -> "Session Splicing", the recommended tool for

performing a session-splicing attack is Nessus. Where Wisker came from is not entirely clear, but

I will assume the author of the question found it while copying Wikipedia.

https://en.wikipedia.org/wiki/Intrusion_detection_system_evasion_techniques One basic

technique is to split the attack payload into multiple small packets so that the IDS must

reassemble the packet stream to detect the attack. A simple way of splitting packets is by

fragmenting them, but an adversary can also simply craft packets with small payloads. The

'whisker' evasion tool calls crafting packets with small payloads 'session splicing'.

By itself, small packets will not evade any IDS that reassembles packet streams. However, small

packets can be further modified in order to complicate reassembly and detection. One evasion

technique is to pause between sending parts of the attack, hoping that the IDS will time out before

the target computer does. A second evasion technique is to send the packets out of order,

confusing simple packet re-assemblers but not the target computer.

NOTE: Yes, I found scraps of information about the tool that existed in 2012, but I can not give

you unverified information. According to the official tutorials, the correct answer is Nessus, but if

you know anything about Wisker, please write in the QA section. Maybe this question will be

updated soon, but I'm not sure about that.

NEW QUESTION: 91

John, a professional hacker, decided to use DNS to perform data exfiltration on a target network,

in this process, he embedded malicious data into the DNS protocol packets that even DNSSEC

cannot detect. Using this technique. John successfully injected malware to bypass a firewall and

maintained communication with the victim machine and C&C server. What is the technique

employed by John to bypass the firewall?

A. DNS cache snooping

B. DNSSEC zone walking

C. DNS tunneling method

D. DNS enumeration

Answer: (SHOW ANSWER)

DNS tunneling may be a method wont to send data over the DNS protocol, a protocol which has

never been intended for data transfer. due to that, people tend to overlook it and it's become a

well-liked but effective tool in many attacks. Most popular use case for DNS tunneling is obtaining

free internet through bypassing captive portals at airports, hotels, or if you are feeling patient the

not-so-cheap on the wing Wi-Fi. On those shared internet hotspots HTTP traffic is blocked until a

username/password is provided, however DNS traffic is usually still allowed within the

background: we will encode our HTTP traffic over DNS and voilà, we've internet access. This

sounds fun but reality is, browsing anything on DNS tunneling is slow. Like, back to 1998 slow.

Another more dangerous use of DNS tunneling would be bypassing network security devices

(Firewalls, DLP appliances...) to line up an immediate and unmonitored communications channel

on an organisation's network. Possibilities here are endless: Data exfiltration, fixing another

penetration testing tool... you name it. To make it even more worrying, there's an outsized amount

of easy to use DNS tunneling tools out there. There's even a minimum of one VPN over DNS

protocol provider (warning: the planning of the web site is hideous, making me doubt on the

legitimacy of it). As a pentester all this is often great, as a network admin not such a lot .

How does it work:

For those that ignoramus about DNS protocol but still made it here, i feel you deserve a really

brief on what DNS does: DNS is sort of a phonebook for the web , it translates URLs (humanfriendly

language, the person's name), into an IP address (machine-friendly language, the phone

number). That helps us remember many websites, same as we will remember many people's

names. For those that know what DNS is i might suggest looking here for a fast refresh on DNS

protocol, but briefly what you would like to understand is: * A Record: Maps a website name to an

IP address. example.com ? 12.34.52.67 * NS Record (a.k.a. Nameserver record): Maps a website

name to an inventory of DNS servers, just in case our website is hosted in multiple servers.

example.com ? server1.example.com, server2.example.com Who is involved in DNS tunneling? *

Client. Will launch DNS requests with data in them to a website . * One Domain that we will

configure. So DNS servers will redirect its requests to an outlined server of our own. * Server. this

is often the defined nameserver which can ultimately receive the DNS requests. The 6 Steps in

DNS tunneling (simplified): 1. The client encodes data during a DNS request. The way it does this

is often by prepending a bit of knowledge within the domain of the request. for instance :

mypieceofdata.server1.example.com 2. The DNS request goes bent a DNS server. 3. The DNS

server finds out the A register of your domain with the IP address of your server. 4. The request

for mypieceofdata.server1.example.com is forwarded to the server. 5. The server processes

regardless of the mypieceofdata was alleged to do. Let's assume it had been an HTTP request. 6.

The server replies back over DNS and woop woop, we've got signal.

Bypassing Firewalls through the DNS Tunneling Method DNS operates using UDP, and it has a

255-byte limit on outbound queries. Moreover, it allows only alphanumeric characters and

hyphens. Such small size constraints on external queries allow DNS to be used as an ideal

choice to perform data exfiltration by various malicious entities. Since corrupt or malicious data

can be secretly embedded into the DNS protocol packets, even DNSSEC cannot detect the

abnormality in DNS tunneling. It is effectively used by malware to bypass the firewall to maintain

communication between the victim machine and the C&C server. Tools such as NSTX

(https://sourceforge.net), Heyoka (http://heyoka.sourceforge.netuse), and Iodine

(https://code.kryo.se) use this technique of tunneling traffic across DNS port 53. CEH v11 Module

12 Page 994

Valid 312-50v12 Dumps shared by PassTestKing.com for Helping Passing 312-50v12 Exam!

PassTestKing.com now offer the newest 312-50v12 exam dumps, the PassTestKing.com

312-50v12 exam questions have been updated and answers have been corrected get the

newest PassTestKing.com 312-50v12 dumps with Test Engine here:

https://www.passtestking.com/ECCouncil/312-50v12-practice-exam-dumps.html (505 Q&As

Dumps, 35%OFF Special Discount Code: freecram)

NEW QUESTION: 92

Bob received this text message on his mobile phone: "Hello, this is Scott Smelby from the Yahoo

Bank. Kindly contact me for a vital transaction on: scottsmelby@yahoo.com". Which statement

below is true?

A. This is a scam because Bob does not know Scott.

B. Bob should write to scottmelby@yahoo.com to verify the identity of Scott.

C. This is probably a legitimate message as it comes from a respectable organization.

D. This is a scam as everybody can get a @Yahoo address, not the Yahoo customer service

employees.

Answer: (SHOW ANSWER)

NEW QUESTION: 93


Your organization has signed an agreement with a web hosting provider that requires you to take

full responsibility of the maintenance of the cloud-based resources. Which of the following models

covers this?

A. Functions as a

B. service Infrastructure as a service

C. Platform as a service

D. Software as a service

Answer: (SHOW ANSWER)

NEW QUESTION: 94


You just set up a security system in your network. In what kind of system would you find the

following string of characters used as a rule within its configuration? alert tcp any any ->

192.168.100.0/24 21 (msg: ""FTP on the network!"";)

A. An Intrusion Detection System

B. A Router IPTable

C. FTP Server rule

D. A firewall IPTable

Answer: (SHOW ANSWER)

NEW QUESTION: 95


You are logged in as a local admin on a Windows 7 system and you need to launch the Computer

Management Console from command line.

Which command would you use?

A. c:\compmgmt.msc

B. c:\services.msc

C. c:\ncpa.cp

D. c:\gpedit

Answer: (SHOW ANSWER)

To start the Computer Management Console from command line just type

compmgmt.msc /computer:computername in your run box or at the command line and it should

automatically open the Computer Management console.

References: http://www.waynezim.com/tag/compmgmtmsc/

NEW QUESTION: 96

Nedved is an IT Security Manager of a bank in his country. One day. he found out that there is a

security breach to his company's email server based on analysis of a suspicious connection from

the email server to an unknown IP Address.

What is the first thing that Nedved needs to do before contacting the incident response team?

A. Migrate the connection to the backup email server

B. Block the connection to the suspicious IP Address from the firewall

C. Leave it as it Is and contact the incident response te3m right away

D. Disconnect the email server from the network

Answer: (SHOW ANSWER)

NEW QUESTION: 97


John, a security analyst working for an organization, found a critical vulnerability on the

organization's LAN that allows him to view financial and personal information about the rest of the

employees. Before reporting the vulnerability, he examines the information shown by the

vulnerability for two days without disclosing any information to third parties or other internal

employees. He does so out of curiosity about the other employees and may take advantage of

this information later. What would John be considered as?

A. Gray hat

B. Black hat

C. Cybercriminal

D. White hat

Answer: (SHOW ANSWER)

NEW QUESTION: 98


CompanyXYZ has asked you to assess the security of their perimeter email gateway. From your

office in New York, you craft a specially formatted email message and send it across the Internet

to an employee of CompanyXYZ. The employee of CompanyXYZ is aware of your test. Your

email message looks like this:

From: jim_miller@companyxyz.com

To: michelle_saunders@companyxyz.com Subject: Test message

Date: 4/3/2017 14:37

The employee of CompanyXYZ receives your email message.

This proves that CompanyXYZ's email gateway doesn't prevent what?

A. Email Masquerading

B. Email Harvesting

C. Email Phishing

D. Email Spoofing

Answer: D (LEAVE A REPLY)

Email spoofing is the fabrication of an email header in the hopes of duping the recipient into

thinking the email originated from someone or somewhere other than the intended source.

Because core email protocols do not have a built-in method of authentication, it is common for

spam and phishing emails to use said spoofing to trick the recipient into trusting the origin of the

message.

The ultimate goal of email spoofing is to get recipients to open, and possibly even respond to, a

solicitation. Although the spoofed messages are usually just a nuisance requiring little action

besides removal, the more malicious varieties can cause significant problems and sometimes

pose a real security threat.

NEW QUESTION: 99

Hackers often raise the trust level of a phishing message by modeling the email to look similar to

the internal email used by the target company. This includes using logos, formatting, and names

of the target company. The phishing message will often use the name of the company CEO,

President, or Managers. The time a hacker spends performing research to locate this information

about a company is known as?

A. Investigation

B. Enumeration

C. Reconnaissance

D. Exploration

Answer: (SHOW ANSWER)

NEW QUESTION: 100

A.
Eavesdropping

B. Sniffing

C. Social Engineering

D. Scanning

Answer: (SHOW ANSWER)
Link:
 
  • Like
Reactions: fognayerku

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom