PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v7)

Exam 312-50 (CEH v7): Certified Ethical Hacker (CEH v7)

Which of the following packets represent completion of the 3-way handshake?

You establish a new Web browser connection to Google. Since a 3-way handshake is required for any TCP connection, the following actions will take place.

– DNS query is sent to the DNS server to resolve www.google.com
– DNS server replies with the IP address for Google?
– SYN packet is sent to Google.
– Google sends back a SYN/ACK packet
– Your computer completes the handshake by sending an ACK
– The connection is established and the transfer of data commences

Which of the following packets represent completion of the 3-way handshake?

Which of the following hping2 command is responsible for the above snort alert?

Jason is the network administrator of Spears Technology. He has enabled SNORT IDS to detect attacks going through his network. He receives Snort SMS alerts on his iPhone whenever there is an attempted intrusion to his network.

He receives the following SMS message during the weekend.
(exhibit)

An attacker Chew Siew sitting in Beijing, China had just launched a remote scan on Jason’s network with the hping command.

Which of the following hping2 command is responsible for the above snort alert?

The FIN flag is set and sent from host A to host B when host A has no more data to transmit…

The FIN flag is set and sent from host A to host B when host A has no more data to transmit (Closing a TCP connection). This flag releases the connection resources. However, host A can continue to receive data as long as the SYN sequence numbers of transmitted packets from host B are lower than the packet segment containing the set FIN flag.

Identify the line in the source code that might lead to buffer overflow?

The programmers on your team are analyzing the free, open source software being used to run FTP services on a server in your organization. They notice that there is excessive number of functions in the source code that might lead to buffer overflow. These C++ functions do not check bounds. Identify the line in the source code that might lead to buffer overflow?

What has William just installed?

William has received a Chess game from someone in his computer programming class through email. William does not really know the person who sent the game very well, but decides to install the game anyway because he really likes Chess.

After William installs the game, he plays it for a couple of hours. The next day, William plays the Chess game again and notices that his machine has begun to slow down. He brings up his Task Manager and sees the following programs running:

What has William just installed?


Page 4 of 26« First...23456...1020...Last »