★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW 312-50 Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/312-50-dumps.html


Q371. Gerald is a Certified Ethical Hacker working for a large financial institution in Oklahoma City. Gerald is currently performing an annual security audit of the company's network. One of the company's primary concerns is how the corporate data is transferred back and forth from the banks all over the city to the data warehouse at the company's home office. To see what type of traffic is being passed back and forth and to see how secure that data really is, Gerald uses a session hijacking tool to intercept traffic between a server and a client. Gerald hijacks an HTML session between a client running a web application which connects to a SQL database at the home office. Gerald does not kill the client's session; he simply monitors the traffic that passes between it and the server. 

What type of session attack is Gerald employing here? 

A. He is utilizing a passive network level hijack to see the session traffic used to communicate between the two devices 

B. Gerald is using a passive application level hijack to monitor the client and server traffic 

C. This type of attack would be considered an active application attack since he is actively monitoring the traffic 

D. This type of hijacking attack is called an active network attack 

Answer: C

Explanation: Session Hijacking is an active attack 


Q372. What port number is used by LDAP protocol? 

A. 110 

B. 389 

C. 445 

D. 464 

Answer:

Explanation: Active Directory and Exchange use LDAP via TCP port 389 for clients. 


Q373. Why is Social Engineering considered attractive by hackers and also adopted by experts in the field? 

A. It is done by well known hackers and in movies as well. 

B. It does not require a computer in order to commit a crime. 

C. It is easy and extremely effective to gain information. 

D. It is not considered illegal. 

Answer: C

Explanation: Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access and in most (but not all) cases the attacker never comes face-to-face with the victim. The term has been popularized in recent years by well known (reformed) computer criminal and security consultant Kevin Mitnick who points out that it's much easier to trick someone into giving you his or her password for a system than to spend the effort to hack in. He claims it to be the single most effective method in his arsenal. 


Q374. Access control is often implemented through the use of MAC address filtering on wireless Access Points. Why is this considered to be a very limited security measure? 

A. Vendors MAC address assignment is published on the Internet. 

B. The MAC address is not a real random number. 

C. The MAC address is broadcasted and can be captured by a sniffer. 

D. The MAC address is used properly only on Macintosh computers. 

Answer: C


Q375. Samuel is high school teenager who lives in Modesto California. Samuel is a straight ‘A’ student who really likes tinkering around with computers and other types of electronic devices. Samuel just received a new laptop for his birthday and has been configuring it ever since. While tweaking the registry, Samuel notices a pop up at the bottom of his screen stating that his computer was now connected to a wireless network. All of a sudden, he was able to get online and surf the Internet. 

Samuel did some quick research and was able to gain access to the wireless router he was connecting to and see al of its settings? Being able to hop onto someone else’s wireless network so easily fascinated Samuel so he began doing more and more research on wireless technologies and how to exploit them. The next day Samuel’s fried said that he could drive around all over town and pick up hundred of wireless networks. This really excited Samuel so they got into his friend’s car and drove around the city seeing which networks they could connect to and which ones they could not. 

What has Samuel and his friend just performed? 

A. Wardriving 

B. Warwalking 

C. Warchalking 

D. Webdriving 

Answer: A

Explanation: Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle using a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks. It was also known (as of 2002) as "WiLDing" (Wireless Lan Driving, although this term never gained any popularity and is no longer used), originating in the San Francisco Bay Area with the Bay Area Wireless Users Group (BAWUG). It is similar to using a scanner for radio. 

Topic 18, Linux Hacking 

437. Windump is the windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform you must install a packet capture library. 

What is the name of this library? 

A. NTPCAP 

B. LibPCAP 

C. WinPCAP 

D. PCAP 

Answer: C

Explanation: WinPcap is the industry-standard tool for link-layer network access in Windows environments: it allows applications to capture and transmit network packets bypassing the protocol stack, and has additional useful features, including kernel-level packet filtering, a network statistics engine and support for remote packet capture. 


Q376. ViruXine.W32 virus hides their presence by changing the underlying executable code. This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all. 

Here is a section of the Virus code: 

What is this technique called? 

A. Polymorphic Virus 

B. Metamorphic Virus 

C. Dravidic Virus 

D. Stealth Virus 

Answer: A


Q377. When working with Windows systems, what is the RID of the true administrator account? 

A. 500 

B. 501 

C. 512 

D. 1001 

E. 1024 

F. 1000 

Answer:

Explanation: The built-in administrator account always has a RID of 500. 


Q378. What are the three phases involved in security testing? 

A. Reconnaissance, Conduct, Report 

B. Reconnaissance, Scanning, Conclusion 

C. Preparation, Conduct, Conclusion 

D. Preparation, Conduct, Billing 

Answer: C

Explanation: Preparation phase - A formal contract is executed containing non-disclosure of the client's data and legal protection for the tester. At a minimum, it also lists the IP addresses to be tested and time to test. Conduct phase - In this phase the penetration test is executed, with the tester looking for potential vulnerabilities. Conclusion phase - The results of the evaluation are communicated to the pre-defined organizational contact, and corrective action is advised. 


Q379. What is the key advantage of Session Hijacking? 

A. It can be easily done and does not require sophisticated skills. 

B. You can take advantage of an authenticated connection. 

C. You can successfully predict the sequence number generation. 

D. You cannot be traced in case the hijack is detected. 

Answer: B

Explanation: As an attacker you don’t have to steal an account and password in order to take advantage of an authenticated connection. 


Q380. Peter extracts the SID list from Windows 2008 Server machine using the hacking tool "SIDExtracter". Here is the output of the SIDs: 

From the above list identify the user account with System Administrator privileges? 

A. John 

B. Rebecca 

C. Sheela 

D. Shawn 

E. Somia 

F. Chang 

G. Micah 

Answer: F