PrepAway - Latest Free Exam Questions & Answers

Category: 312-50V8 (v.1)

Exam 312-50V8: ECCouncil Certified Ethical Hacker v8 (update October 4th, 2015)

Where can Stephanie go to see past versions and pages of a website?

Stephanie works as senior security analyst for a manufacturing company in Detroit. Stephanie
manages network security throughout the organization. Her colleague Jason told her in confidence
that he was able to see confidential corporate information posted on the external website
http://www.jeansclothesman.com. He tries random URLs on the company’s website and finds
confidential information leaked over the web. Jason says this happened about a month ago.
Stephanie visits the said URLs, but she finds nothing. She is very concerned about this, since
someone should be held accountable if there was sensitive information posted on the website.

Where can Stephanie go to see past versions and pages of a website?

Why do you think Dan might not be able to get an interactive session?

Dan is conducting penetration testing and has found a vulnerability in a Web Application which
gave him the sessionID token via a cross site scripting vulnerability. Dan wants to replay this
token. However, the session ID manager (on the server) checks the originating IP address as well.
Dan decides to spoof his IP address in order to replay the sessionID. Why do you think Dan might
not be able to get an interactive session?

What technique has Jason most likely used?

Jason works in the sales and marketing department for a very large advertising agency located in
Atlanta. Jason is working on a very important marketing campaign for his company’s largest client.
Before the project could be completed and implemented, a competing advertising company comes
out with the exact same marketing materials and advertising, thus rendering all the work done for
Jason’s client unusable. Jason is questioned about this and says he has no idea how all the
material ended up in the hands of a competitor.
Without any proof, Jason’s company cannot do anything except move on. After working on
another high profile client for about a month, all the marketing and sales material again ends up in
the hands of another competitor and is released to the public before Jason’s company can finish

the project. Once again, Jason says that he had nothing to do with it and does not know how this
could have happened. Jason is given leave with pay until they can figure out what is going on.
Jason’s supervisor decides to go through his email and finds a number of emails that were sent to
the competitors that ended up with the marketing material. The only items in the emails were
attached jpg files, but nothing else. Jason’s supervisor opens the picture files, but cannot find
anything out of the ordinary with them.
What technique has Jason most likely used?

What is this deadly attack called?

An attacker finds a web page for a target organization that supplies contact information for the
company. Using available details to make the message seem authentic, the attacker drafts e-mail
to an employee on the contact page that appears to come from an individual who might
reasonably request confidential information, such as a network administrator.
The email asks the employee to log into a bogus page that requests the employee’s user name
and password or click on a link that will download spyware or other malicious programming.
Google’s Gmail was hacked using this technique and attackers stole source code and sensitive
data from Google servers. This is highly sophisticated attack using zero-day exploit vectors, social
engineering and malware websites that focused on targeted individuals working for the company.
What is this deadly attack called?


Page 3 of 8812345...102030...Last »