PrepAway - Latest Free Exam Questions & Answers

Category: 312-50 (CEH v6)

Exam 312-50: Ethical Hacking and Countermeasures (CEH v6)

How can Richard apply this setting across thenetwork if it is running under one Windows Server 2003 Active Dir

Richard is the systems administrator for BillRight Incorporated, a medical billing company in Minneapolis. Richard is currently writing the company�s IT security policies. Based on instructions from the IT director, Richard has written the password policy to require complex passwords, passwords must be at least 8characters, and user accounts will be locked out after 5 unsuccessful attemptsto help prevent against brute force attacks. One of the IT policies also statesthat user computers must utilize a password protected screensaver that is activated after 20 minutes of inactivity. Richard wants the logon attempts to unlocka screensaver to apply towards the number of attempts that will lockout a useraccount if tried too many times. How can Richard apply this setting across thenetwork if it is running under one Windows Server 2003 Active Directory domain?

How can Phillip logon to this computer as administrator if he must keep if offline?

Phillip is the systems administrator for Photopia Incorporated, a camera manufacturing company in Des Moines. Phillip is responsible for the company�s entire network which consists of one 2003 Active Directory domain. Some computer accounts have been placed in a special Organizational Unit (OU) called RestrictedComputer Accounts because those computers have been placed outside the firewallto allow for video conferencing. These computers are all running Windows XP SP2. These computers have very stringent group policies applied to them so they can be as secure as possible. In particular, the �Accounts: Administrator accountstatus� setting in group policy is set to disabled. While performing a security audit, Phillip finds some hacking software on one of the computers in the Restricted Computer Accounts OU. He immediately takes that computer offline to keepit from infecting or contaminating any more computers. Phillip cannot logon tothe computer as an administrator since the group policy was set to disable thataccount. How can Phillip logon to this computer as administrator if he must keep if offline?

What setting does Jerald need to adjust to prevent this same issue from happening again?

Jerald is the systems administrator for his company. Jerald is responsiblefor all servers, workstations, and network security. Based on company policy, every available auditing feature is turned on for the network through Group Policy. Jerald comes in to work one morning and two of his Domain Controllers are completely shut down. Jerald boots the two machines up and checks their event logs. Then Jerald checks the firewall logs to see if anything stands out. From the event and firewall logs, it appears that a hacker was able to gain access to the two servers using an old unused service account that had a weak password. The hacker then was apparently able to generate millions of erroneous events in th e server event logs which caused them to shut down. What setting does Jerald need to adjust to prevent this same issue from happening again?

What else does Louis need to do to ensure that Steven can add computers to the domain?

Louis is the senior systems administrator for the University of Eastern Wyoming. Louis manages 25 IT technicians and junior systems administrators. The Un iversity�s network consists of one Windows Server 2003 Active Directory domain.All domain user accounts are contained in one Organizational Unit (OU) called Staff. All domain computer accounts are contained in one OU called Computer Accounts. Louis wants one of his junior systems administrators, Steven, to be ableto add workstations to the domain. All computer accounts are added to the Computer Accounts OU by default when they are joined to the domain. Louis has giventhe �Add workstations to domain� permission to Steven�s user account, but he isstill not able to add computer accounts to the domain. What else does Louis need to do to ensure that Steven can add computers to the domain?

What Group Policy change can Jayson make toensure that all users in the �RDP Deny� group cannot access the

Jayson is the network administrator for Consultants Galore, an IT consultingfirm based in Kansas City. Jayson is responsible for the company�s entire network which consists of one Windows Server 2003 Active Directory domain. Almost all employees have Remote Desktop access to the servers so they can perform theirwork duties. Jayson has created a security group in Active Directory called �RDP Deny� which contains all the user accounts that should not have Remote Deskto p permission to any of the servers. What Group Policy change can Jayson make toensure that all users in the �RDP Deny� group cannot access the company serversthrough Remote Desktop?

Which of the following tool would allow you to detect unauthorized changes or modification of binary files on

Virus Scrubbers and other malware detection program can only detect items they know about. Which of the following tool would allow you to detect unauthorized changes or modification of binary files on your system by unknown malware?

Which event log located at c:windowssystem32config contains the trace of your brute force attempts?

You have successfully brute forced basic authentication configured on a Web server using Brutus hacking tool. The username / password is “Admin” and “Bettlemani@”. You logon to the system using the brute forced password and plant backdoors and rootkits.
After downloading various sensitive documents from the compromised machine, you proceed to clear the log files to hide your trace.
Which event log located at c:windowssystem32config contains the trace of your brute force attempts?

In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the explo

In Buffer Overflow exploit, which of the following registers gets overwritten with return address of the exploit code?

What has Samuel and his friend just performed?

Samuel is a high school teenager who lives in Modesto California. Samuel is a straight ‘A’ student who really likes tinkering around with computers and other types of electronic devices. Samuel just received a new laptop for his birthday and has been configuring it ever since. While tweaking the registry, Samuel notices a pop up at the bottom of his screen stating that his computer was now connected to a wireless network. All of a sudden, he was able to get online and surf the Internet.
Samuel did some quick research and was able to gain access to the wireless router he was connecting to and see all of its settings. Being able to hop onto someone else’s wireless network so easily fascinated Samuel, so he began doing more and more research on wireless technologies and how to exploit them. The next day, Samuel’s friend said that he could drive around all over town and pick up hundreds upon hundreds of wireless networks. This really excited Samuel so they got into his friend’s car and drove around the city seeing which networks they could connect to and which ones they could not.
What has Samuel and his friend just performed?


Page 57 of 125« First...102030...5556575859...708090...Last »