PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

How does a polymorphic shellcode work?

More sophisticated IDSs look for common shellcode signatures. But even these systems can be bypassed, by using polymorphic shellcode. This is a technique common among virus writers it basically hides the true nature of the shellcode in different disguises.
How does a polymorphic shellcode work?

What has Blake just accomplished?

Blake is in charge of securing all 20 of his company’s servers. He has enabled hardware and software firewalls, hardened the operating systems, and disabled all unnecessary services on all the servers. Unfortunately, there is proprietary AS400 emulation software that must run on one of the servers that requires the telnet service to function properly. Blake is especially concerned about this since telnet can be a very large security risk in an organization. Blake is concerned about how this particular server might look to an outside attacker so he decides to perform some footprinting, scanning, and penetration tests on the server.Blake telnets into the server and types in the following command:
HEAD / HTTP/1.0
After pressing enter twice, Blake gets the following results:
What has Blake just accomplished?

Which of the following ethereal filters will you configure to display only the packets with hotmail e- mail me

You are sniffing an unprotected WiFI network located in a JonDonalds Cybercafe with Ethereal to capture hotmail e-mail traffic. You see lots of people using their laptops browsing the web while sipping brewed coffee from JonDonalds. You want to sniff their e-mail messages traversing the unprotected WiFi network.
Which of the following ethereal filters will you configure to display only the packets with hotmail e- mail messages?

What will this command accomplish?

Michael is the security administrator for the ABC company.?Michael has been charged with strengthening the company’s security policies, including its password policies.Due to certain legacy applications, Michael was only able to enforce a password group policy in Active Directory with a minimum of 10 characters.He has informed the company’s employees, however, that the new password policy requires that everyone must have complex passwords with at least 14 characters.Michael wants to ensure that everyone is using complex passwords that meet the new security policy requirements.Michael has just logged on to one of the network’s domain controllers and is about to run the following command.
What will this command accomplish?

Can June use an antivirus program in this case and would it be effective against a polymorphic virus?

June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its known viral signature and hide from signature-based antivirus programs. Can June use an antivirus program in this case and would it be effective against a polymorphic virus?

Which tool/utility can help you extract the application layer data from each TCP connection from a log file in

Which tool/utility can help you extract the application layer data from each TCP connection from a log file into separate files?

Which of the following is NOT a means that can be used to minimize or protect against such an attack?

Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and forward it so that the server might perform undesirable actions. Alternatively, the attacker could pose as the server or client after a legitimate authentication and gain unauthorized access to data. Which of the following is NOT a means that can be used to minimize or protect against such an attack?

What file system vulnerability does the following command take advantage of?

What file system vulnerability does the following command take advantage of?
type c:anyfile.exe > c:winntsystem32calc.exe:anyfile.exe

?What software application could you use to hide the data on the CD's and USB flash drives?

You are the IT manager of a large legal firm in California. Your firm represents many important clients whose names always must remain anonymous to the public. Your boss, Mr. Smith, is always concerned about client information being leaked or revealed to the press or public. You have just finished a complete security overhaul of your information systems including an updated IPS, new firewalls, email encryption, and employee security awareness training. Unfortunately, many of your firm’s clients do not trust technology to completely secure their information, so couriers routinely have to travel back and forth, to and from the office with sensitive information.
Your boss has charged you with figuring out how to secure the information the couriers must transport. You propose that the data be transferred using burned CD’s or USB flash drives. You initially think of encrypting the files, but decide against that method for fear the encryption keys could eventually be broken.?
What software application could you use to hide the data on the CD’s and USB flash drives?

SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)

SNMP is a connectionless protocol that uses UDP instead of TCP packets (True or False)


Page 52 of 125« First...102030...5051525354...607080...Last »