PrepAway - Latest Free Exam Questions & Answers

Category: 312-50v8

Exam 312-50v8: Certified Ethical Hacker (v8)

Which of the following command results in packets that will appear to originate from the system at 10.8.8.8?

Perimeter testing means determining exactly what your firewall blocks and what it allows. To
conduct a good test, you can spoof source IP addresses and source ports. Which of the following
command results in packets that will appear to originate from the system at 10.8.8.8? Such a
packet is useful for determining whether the firewall is allowing random packets in or out of your
network.

The URL may appear like this: https://www.xsecurity-bank.com/creditcard.asp?

The GET method should never be used when sensitive data such as credit card is being sent to a
CGI program. This is because any GET command will appear in the URL, and will be logged by
any servers. For example, let’s say that you’ve entered your credit card information into a form that
uses the GET method. The URL may appear like this:
https://www.xsecurity-bank.com/creditcard.asp?cardnumber=453453433532234
The GET method appends the credit card number to the URL. This means that anyone with
access to a server log will be able to obtain this information. How would you protect from this type
of attack?

What can Wayne infer from this traffic log?

Wayne is the senior security analyst for his company. Wayne is examining some traffic logs on a
server and came across some inconsistencies. Wayne finds some IP packets from a computer

purporting to be on the internal network. The packets originate from 192.168.12.35 with a TTL of
15. The server replied to this computer and received a response from 192.168.12.35 with a TTL of
21. What can Wayne infer from this traffic log?


Page 45 of 88« First...102030...4344454647...506070...Last »