PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

Which one of the following attacks will pass through a network layer intrusion detection system undetected?

Which one of the following attacks will pass through a network layer intrusion detection system undetected?

what is the attacker ultimately trying to achieve as inferred from the log sequence?

After studying the following log entries, what is the attacker ultimately trying to achieve as inferred from the log sequence?
1. mkdir -p /etc/X11/applnk/Internet/.etc
2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd
3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd
4. touch -acmr /etc /etc/X11/applnk/Internet/.etc
5. passwd nobody -d
6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash
7. passwd dns -d
8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd
9. touch -acmr /etc/X11/applnk/Internet/.etc /etc

What does this mean in the context of Linux Security?

Johnis discussing security with Jane. Jane had mentioned to John earlier that she suspects an LKM has been installed on her server. She believes this is the reason that the server has been acting erratically lately. LKM stands for Loadable Kernel Module. What does this mean in the context of Linux Security?

How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by u

Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?

What can Joe do to hide the wiretap program from being detected by ifconfig command?

Joe the Hacker breaks into pass4sure’s Linux system and plants a wiretap program in order to sniff passwords and user accounts off the wire. The wiretap program is embedded as a Trojan horse in one of the network utilities. Joe is worried that network administrator might detect the wiretap program by querying the interfaces to see if they are running in promiscuous mode.
Running “ifconfig -a”will produce the following: #
ifconfig -a 1o0: flags=848 mtu 8232 inet 127.0.0.1
netmask ff000000hme0: flags=863 mtu 1500 inet
192.0.2.99 netmask ffffff00 broadcast 134.5.2.255
ether 8:0:20:9c:a2:35 What can Joe do to hide the wiretap program from being detected by ifconfig command?


Page 16 of 125« First...10...1415161718...304050...Last »