ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











Gilbert, a web developer, uses a centralized web API to reduce complexity and increase the Integrity of updating and changing dat a. For this purpose, he uses a web service that uses HTTP methods such as PUT. POST. GET. and DELETE and can improve the overall performance, visibility, scalability, reliability, and portability of an application. What is the type of web-service API mentioned in the above scenario?

A.
JSON-RPC
A.
JSON-RPC
Answers
B.
SOAP API
B.
SOAP API
Answers
C.
RESTful API
C.
RESTful API
Answers
D.
REST API
D.
REST API
Answers
Suggested answer: C

Explanation:

*REST is not a specification, tool, or framework, but instead is an architectural style for web services that serves as a communication medium between various systems on the web. *RESTful APIs, which are also known as RESTful services, are designed using REST principles and HTTP communication protocols RESTful is a collection of resources that use HTTP methods such as PUT, POST, GET, and DELETE RESTful API: RESTful API is a RESTful service that is designed using REST principles and HTTP communication protocols. RESTful is a collection of resources that use HTTP methods such as PUT, POST, GET, and DELETE. RESTful API is also designed to make applications independent to improve the overall performance, visibility, scalability, reliability, and portability of an application. APIs with the following features can be referred to as to RESTful APIs: o Stateless: The client end stores the state of the session; the server is restricted to save data during the request processing o Cacheable:

The client should save responses (representations) in the cache. This feature can enhance API performance pg. 1920 CEHv11 manual.

https://cloud.google.com/files/apigee/apigee-web-api-design-the-missing-link-ebook.pdf The HTTP methods GET, POST, PUT or PATCH, and DELETE can be used with these templates to read, create, update, and delete description resources for dogs and their owners. This API style has become popular for many reasons. It is straightforward and intuitive, and learning this pattern is similar to learning a programming language API. APIs like this one are commonly called RESTful APIs, although they do not display all of the characteristics that define REST (more on REST later).

Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about ONS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names. IP addresses. DNS records, and network Who is records. He further exploited this information to launch other sophisticated attacks.

What is the tool employed by Gerard in the above scenario?

A.
Knative
A.
Knative
Answers
B.
zANTI
B.
zANTI
Answers
C.
Towelroot
C.
Towelroot
Answers
D.
Bluto
D.
Bluto
Answers
Suggested answer: D

Explanation:

https://www.darknet.org.uk/2017/07/bluto-dns-recon-zone-transfer-brute-forcer/ "Attackers also use DNS lookup tools such as DNSdumpster.com, Bluto, and Domain Dossier to retrieve DNS records for a specified domain or hostname.

These tools retrieve information such as domains and IP addresses, domain Whois records, DNS records, and network Whois records." CEH Module 02 Page 138

Boney, a professional hacker, targets an organization for financial benefits. He performs an attack by sending his session ID using an MITM attack technique. Boney first obtains a valid session ID by logging into a service and later feeds the same session 10 to the target employee. The session ID links the target employee to Boneys account page without disclosing any information to the victim.

When the target employee clicks on the link, all the sensitive payment details entered in a form are linked to Boneys account. What is the attack performed by Boney in the above scenario?

A.
Session donation attack
A.
Session donation attack
Answers
B.
Session fixation attack
B.
Session fixation attack
Answers
C.
Forbidden attack
C.
Forbidden attack
Answers
D.
CRIME attack
D.
CRIME attack
Answers
Suggested answer: A

Explanation:

In a session donation attack, the attacker donates their own session ID to the target user. In this attack, the attacker first obtains a valid session ID by logging into a service and later feeds the same session ID to the target user. This session ID links a target user to the attacker's account page without disclosing any information to the victim. When the target user clicks on the link and enters the details (username, password, payment details, etc.) in a form, the entered details are linked to the attacker's account. To initiate this attack, the attacker can send their session ID using techniques such as cross-site cooking, an MITM attack, and session fixation. A session donation attack involves the following steps.

Which of the following commands checks for valid users on an SMTP server?

A.
RCPT
A.
RCPT
Answers
B.
CHK
B.
CHK
Answers
C.
VRFY
C.
VRFY
Answers
D.
EXPN
D.
EXPN
Answers
Suggested answer: C

Explanation:

The VRFY commands enables SMTP clients to send an invitation to an SMTP server to verify that mail for a selected user name resides on the server. The VRFY command is defined in RFC 821.

The server sends a response indicating whether the user is local or not, whether mail are going to be forwarded, and so on. A response of 250 indicates that the user name is local; a response of 251 indicates that the user name isn't local, but the server can forward the message. The server response includes the mailbox name.

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session, upon receiving the users request. Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website.

What is the attack performed by Bobby in the above scenario?

A.
Wardriving
A.
Wardriving
Answers
B.
KRACK attack
B.
KRACK attack
Answers
C.
jamming signal attack
C.
jamming signal attack
Answers
D.
aLTEr attack
D.
aLTEr attack
Answers
Suggested answer: D

Explanation:

https://alter-attack.net/media/breaking_lte_on_layer_two.pdf

The new aLTEr attack can be used against nearly all LTE connected endpoints by intercepting traffic and redirecting it to malicious websites together with a particular approach for Apple iOS devices.

This attack works by taking advantage of a style flaw among the LTE network — the information link layer (aka: layer-2) of the LTE network is encrypted with AES-CTR however it's not integrityprotected, that is why an offender will modify the payload.

As a result, the offender is acting a classic man-in-the-middle wherever they're movement as a cell tower to the victim.

in the Common Vulnerability Scoring System (CVSS) v3.1 severity ratings, what range does medium vulnerability fall in?

A.
3.0-6.9
A.
3.0-6.9
Answers
B.
40-6.0
B.
40-6.0
Answers
C.
4.0-6.9
C.
4.0-6.9
Answers
D.
3.9-6.9
D.
3.9-6.9
Answers
Suggested answer: C

Explanation:

What is the file that determines the basic configuration (specifically activities, services, broadcast receivers, etc.) in an Android application?

A.
AndroidManifest.xml
A.
AndroidManifest.xml
Answers
B.
APK.info
B.
APK.info
Answers
C.
resources.asrc
C.
resources.asrc
Answers
D.
classes.dex
D.
classes.dex
Answers
Suggested answer: A

Explanation:

The AndroidManifest.xml file contains information of your package, including components of the appliance like activities, services, broadcast receivers, content providers etc.

It performs another tasks also:

• it's responsible to guard the appliance to access any protected parts by providing the permissions.

• It also declares the android api that the appliance goes to use.

• It lists the instrumentation classes. The instrumentation classes provides profiling and other informations. These informations are removed just before the appliance is published etc.

This is the specified xml file for all the android application and located inside the basis directory.

A friend of yours tells you that he downloaded and executed a file that was sent to him by a coworker. Since the file did nothing when executed, he asks you for help because he suspects that he may have installed a trojan on his computer.

what tests would you perform to determine whether his computer Is Infected?

A.
Use ExifTool and check for malicious content.
A.
Use ExifTool and check for malicious content.
Answers
B.
You do not check; rather, you immediately restore a previous snapshot of the operating system.
B.
You do not check; rather, you immediately restore a previous snapshot of the operating system.
Answers
C.
Upload the file to VirusTotal.
C.
Upload the file to VirusTotal.
Answers
D.
Use netstat and check for outgoing connections to strange IP addresses or domains.
D.
Use netstat and check for outgoing connections to strange IP addresses or domains.
Answers
Suggested answer: D

Garry is a network administrator in an organization. He uses SNMP to manage networked devices from a remote location. To manage nodes in the network, he uses MIB. which contains formal descriptions of all network objects managed by SNMP. He accesses the contents of MIB by using a web browser either by entering the IP address and Lseries.mlb or by entering the DNS library name and Lseries.mlb. He is currently retrieving information from an MIB that contains object types for workstations and server services. Which of the following types of MIB is accessed by Garry in the above scenario?

A.
LNMIB2.MIB
A.
LNMIB2.MIB
Answers
B.
WINS.MIB
B.
WINS.MIB
Answers
C.
DHCP.MIS
C.
DHCP.MIS
Answers
D.
MIB_II.MIB
D.
MIB_II.MIB
Answers
Suggested answer: A

Explanation:

DHCP.MIB: Monitors network traffic between DHCP servers and remote hosts ¦ HOSTMIB.MIB: Monitors and manages host resources ¦ LNMIB2.MIB: Contains object types for workstation and server services ¦ MIBJI.MIB: Manages TCP/IP- based Internet using a simple architecture and system ¦ WINS.MIB: For the Windows Internet Name Service (WINS)

An attacker redirects the victim to malicious websites by sending them a malicious link by email. The link appears authentic but redirects the victim to a malicious web page, which allows the attacker to steal the victim's dat a. What type of attack is this?

A.
Phishing
A.
Phishing
Answers
B.
Vlishing
B.
Vlishing
Answers
C.
Spoofing
C.
Spoofing
Answers
D.
DDoS
D.
DDoS
Answers
Suggested answer: A

Explanation:

https://en.wikipedia.org/wiki/Phishing

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack, or the revealing of sensitive information.

An attack can have devastating results. For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft.

Moreover, phishing is often used to gain a foothold in corporate or governmental networks as a part of a larger attack, such as an advanced persistent threat (APT) event. In this latter scenario, employees are compromised in order to bypass security perimeters, distribute malware inside a closed environment, or gain privileged access to secured data.

An organization succumbing to such an attack typically sustains severe financial losses in addition to declining market share, reputation, and consumer trust. Depending on the scope, a phishing attempt might escalate into a security incident from which a business will have a difficult time recovering.

Incorrect answers:

Vishing https://en.wikipedia.org/wiki/Voice_phishing

Voice phishing, or vishing, is the use of telephony (often Voice over IP telephony) to conduct phishing attacks.

DDoS https://en.wikipedia.org/wiki/Denial-of-service_attack

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices.

Spoofing https://en.wikipedia.org/wiki/Spoofing_attack In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.

Total 573 questions
Go to page: of 58