PrepAway - Latest Free Exam Questions & Answers

Category: 312-50V8 (v.1)

Exam 312-50V8: ECCouncil Certified Ethical Hacker v8 (update October 4th, 2015)

What is odd about this attack?

Exhibit

(Note: the student is being tested on concepts learnt during passive OS fingerprinting, basic
TCP/IP connection concepts and the ability to read packet signatures from a sniff dump.)
Snort has been used to capture packets on the network. On studying the packets, the penetration
tester finds it to be abnormal. If you were the penetration tester, why would you find this
abnormal?
What is odd about this attack? Choose the best answer.

Which organization coordinates computer crime investigations throughout the United States?

Sandra is the security administrator of XYZ.com. One day she notices that the XYZ.com Oracle
database server has been compromised and customer information along with financial data has
been stolen. The financial loss will be estimated in millions of dollars if the database gets into the
hands of competitors. Sandra wants to report this crime to the law enforcement agencies
immediately.
Which organization coordinates computer crime investigations throughout the United States?

How can you modify your scan to prevent triggering this event in the IDS?

While performing ping scans into a target network you get a frantic call from the organization’s
security team. They report that they are under a denial of service attack. When you stop your
scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you
modify your scan to prevent triggering this event in the IDS?


Page 58 of 88« First...102030...5657585960...7080...Last »