[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-50 Dumps with VCE and PDF 331-340

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-50
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/312-50.html

Ethical Hacking and Countermeasures

Question No: 331 – (Topic 10)

Which is the right sequence of packets sent during the initial TCP three way handshake?

  1. FIN, FIN-ACK, ACK

  2. SYN, URG, ACK

  3. SYN, ACK, SYN-ACK

  4. SYN, SYN-ACK, ACK

Answer: D

Explanation: A TCP connection always starts with a request for synchronization, a SYN, the reply to that would be another SYN together with a ACK to acknowledge that the last package was delivered successfully and the last part of the three way handshake should be only an ACK to acknowledge that the SYN reply was recived.

Topic 11, Hacking Web Servers

Question No: 332 – (Topic 11)

Kevin sends an email invite to Chris to visit a forum for security professionals. Chris clicks on the link in the email message and is taken to a web based bulletin board.

Unknown to Chris, certain functions are executed on his local system under his privileges, which allow Kevin access to information used on the BBS. However, no executables are downloaded and run on the local system. What would you term this attack?

  1. Phishing

  2. Denial of Service

  3. Cross Site Scripting

  4. Backdoor installation

Answer: C

Explanation: This is a typical Type-1 Cross Site Scripting attack. This kind of cross-site scripting hole is also referred to as a nonpersistent or reflected vulnerability, and is by far the most common type. These holes show up when data provided by a web client is used immediately by server-side scripts to generate a page of results for that user. If unvalidated user-supplied data is included in the resulting page without HTML encoding, this will allow client-side code to be injected into the dynamic page. A classic example of this is in site search engines: if one searches for a string which includes some HTML special characters, often the search string will be redisplayed on the result page to indicate what was searched for, or will at least include the search terms in the text box for easier editing. If all occurrences of the search terms are not HTML entity encoded, an XSS hole will result.

Question No: 333 – (Topic 11)

Which of the following buffer overflow exploits are related to Microsoft IIS web server? (Choose three)

  1. Internet Printing Protocol (IPP) buffer overflow

  2. Code Red Worm

  3. Indexing services ISAPI extension buffer overflow

  4. NeXT buffer overflow

Answer: A,B,C

Explanation: Both the buffer overflow in the Internet Printing Protocol and the ISAPI extension buffer overflow is explained in Microsoft Security Bulletin MS01-023. The Code Red worm was a computer worm released on the Internet on July 13, 2001. It attacked computers running Microsoft#39;s IIS web server.

Question No: 334 – (Topic 11)

An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the price?

  1. By using SQL injection

  2. By using cross site scripting

  3. By changing hidden form values in a local copy of the web page

  4. There is no way the attacker could do this without directly compromising either the web server or the database

Answer: C

Explanation: Changing hidden form values is possible when a web site is poorly built and is trusting the visitors computer to submit vital data, like the price of a product, to the database.

Question No: 335 – (Topic 11)

Bubba has just accessed he preferred ecommerce web site and has spotted an item that he would like to buy. Bubba considers the price a bit too steep. He looks at the source code of the webpage and decides to save the page locally, so that he can modify the page variables. In the context of web application security, what do you think Bubba has changes?

  1. A hidden form field value.

  2. A hidden price value.

  3. An integer variable.

  4. A page cannot be changed locally, as it is served by a web server.

Answer: A

Question No: 336 – (Topic 11)

You are gathering competitive intelligence on ABC.com. You notice that they have jobs listed on a few Internet job-hunting sites. There are two job postings for network and system administrators. How can this help you in footprint the organization?

  1. The IP range used by the target network

  2. An understanding of the number of employees in the company

  3. How strong the corporate security policy is

  4. The types of operating systems and applications being used.

Answer: D Explanation:

From job posting descriptions one can see which is the set of skills, technical knowledge, system experience required, hence it is possible to argue what kind of operating systems and applications the target organization is using.

Question No: 337 – (Topic 11)

You visit a website to retrieve the listing of a company#39;s staff members. But you can not find it on the website. You know the listing was certainly present one year before. How can you retrieve information from the outdated website?

  1. Through Google searching cached files

  2. Through Archive.org

  3. Download the website and crawl it

  4. Visit customers#39; and prtners#39; websites

Answer: B

Explanation: Explanation: Archive.org mirrors websites and categorizes them by date and month depending on the crawl time. Archive.org dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the website is incorrect because that#39;s the same as

what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, archive.org

Question No: 338 – (Topic 11)

Take a look at the following attack on a Web Server using obstructed URL:

http://www.example.com/script.ext?template….././et% 63/passwd

The request is made up of:

->../.././% = ../../../

->etc = etc

->/ = /

->passwd = passwd

How would you protect information systems from these attacks?

  1. Configure Web Server to deny requests involving Unicode characters.

  2. Create rules in IDS to alert on strange Unicode requests.

  3. Use SSL authentication on Web Servers.

  4. Enable Active Scripts Detection at the firewall and routers.

Answer: B

Explanation: This is a typical Unicode attack. By configuring your IDS to trigger on strange Unicode requests you can protect your web-server from this type of attacks.

Question No: 339 – (Topic 11)

What are the differences between SSL and S-HTTP?

  1. SSL operates at the network layer and S-HTTP operates at the application layer

  2. SSL operates at the application layer and S-HTTP operates at the network layer

  3. SSL operates at the transport layer and S-HTTP operates at the application layer

  4. SSL operates at the application layer and S-HTTP operates at the transport layer

Answer: C

Explanation: The main difference between the protocols is the layer at which they operate. SSL operates at the transport layer and mimics the quot;socket library,quot; while S-HTTP operates at the application layer. Encryption of the transport layer allows SSL to be application- independent, while S-HTTP is limited to the specific software implementing it. The protocols adopt different philosophies towards encryption as well, with SSL encrypting the entire communications channel and S-HTTP encrypting each message independently.

Question No: 340 – (Topic 11)

Bart is looking for a Windows NT/2000/XP command-line tool that can be used to assign, display, or modify ACL’s (access control lists) to files or folders and also one that can be used within batch files.

Which of the following tools can be used for that purpose? (Choose the best answer)

  1. PERM.exe

  2. CACLS.exe

  3. CLACS.exe

  4. NTPERM.exe

Answer: B

Explanation: Cacls.exe is a Windows NT/2000/XP command-line tool you can use to assign, display, or modify ACLs (access control lists) to files or folders. Cacls is an interactive tool, and since it#39;s a command-line utility, you can also use it in batch files.

100% Ensurepass Free Download!
Download Free Demo:312-50 Demo PDF
100% Ensurepass Free Guaranteed!
312-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.