PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

ARP poisoning is achieved in _____ steps

ARP poisoning is achieved in _____ steps

The two popular types of buffer overflows prevalent today are:

Buffer overflows are one of the top flaws for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold. The two popular types of buffer overflows prevalent today are:

What are some common vulnerabilities in web applications that he should be concerned about?

Bret is a web application administrator and has just read that there are a number of surprisingly common web application vulnerabilities that can be exploited by unsophisticated attackers with easily available tools on the Internet.
He has also read that when an organization deploys a web application, they invite the world to send HTTP requests. Attacks buried in these requests sail past firewalls, filters, platform hardening, SSL, and IDS without notice because they are inside legal HTTP requests. Bret is determined to weed out any vulnerabilities. What are some common vulnerabilities in web applications that he should be concerned about?

com/tools/)However, are there any other alternative ways to make sure that the services that have been scanned

Scanning for services is an easy job for Bob as there are so many tools available from the Internet. In order for him to check the vulnerability of Brownies Inc., he went through a few scanners that are currently available.
Here are the scanners that he used:
Axent’s NetRecon (http://www.axent.com)
SARA, by Advanced Research Organization (http://www-arc.com/sara/)
VLAD the Scanner, by Razor (http://razor.bindview.com/tools/)
However, are there any other alternative ways to make sure that the services that have been scanned will be more accurately reported and detailed for Bob? What would be the best method to accurately identify the services running on a victim host?

What authentication mechanism is being followed here?

Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is being followed here?

Who are the primary victims of these attacks on the Internet today?

Smurf is a simple attack based on IP spoofing and broadcasts. A single packet (such as an ICMP Echo Request) is sent as a directed broadcast to a subnet on the Internet. All the machines on that subnet respond to this broadcast. By spoofing the source IP address of the packet, all the responses will get sent to the spoofed IP address. Thus, a hacker can often flood a victim with hundreds of responses for every request the hacker sends out.
Who are the primary victims of these attacks on the Internet today?

How should mark protect his network from an attacker using Hping2 to scan his internal network?

Mark works as a contractor for the Department of Defense and is in charge of network security. He has spent the last month securing access to his network from all possible entry points. He has segmented his network into several subnets and has installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used. He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Mark is fairly confident of his perimeter defenses, but is still worried about programs like Hping2 that can get into a network through covert channels.
How should mark protect his network from an attacker using Hping2 to scan his internal network?


Page 48 of 125« First...102030...4647484950...607080...Last »