ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 36

Question list
Search
Search

List of questions

Search

Related questions











Sam is a penetration tester hired by Inception Tech, a security organization. He was asked to perform port scanning on a target host in the network. While performing the given task, Sam sends FIN/ACK probes and determines that an RST packet is sent in response by the target host, indicating that the port is closed.

What is the port scanning technique used by Sam to discover open ports?

A.
Xmas scan
A.
Xmas scan
Answers
B.
IDLE/IPID header scan
B.
IDLE/IPID header scan
Answers
C.
TCP Maimon scan
C.
TCP Maimon scan
Answers
D.
ACK flag probe scan
D.
ACK flag probe scan
Answers
Suggested answer: C

Explanation:

TCP Maimon scan This scan technique is very similar to NULL, FIN, and Xmas scan, but the probe used here is FIN/ACK. In most cases, to determine if the port is open or closed, the RST packet should be generated as a response to a probe request.

However, in many BSD systems, the port is open if the packet gets dropped in response to a probe.

https://nmap.org/book/scan-methods-maimon-scan.html

How Nmap interprets responses to a Maimon scan probe

Probe Response Assigned State

No response received (even after retransmissions) open|filtered

TCP RST packet closed

ICMP unreachable error (type 3, code 1, 2, 3, 9, 10, or 13) filtered

Based on the below log, which of the following sentences are true?

Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip

A.
Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server.
A.
Application is FTP and 10.240.250.23 is the client and 10.249.253.15 is the server.
Answers
B.
Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the client.
B.
Application is SSH and 10.240.250.23 is the server and 10.249.253.15 is the client.
Answers
C.
SSH communications are encrypted; it's impossible to know who is the client or the server.
C.
SSH communications are encrypted; it's impossible to know who is the client or the server.
Answers
D.
Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server.
D.
Application is SSH and 10.240.250.23 is the client and 10.249.253.15 is the server.
Answers
Suggested answer: D

Explanation:

Mar 1, 2016, 7:33:28 AM 10.240.250.23 - 54373 10.249.253.15 - 22 tcp_ip Let's just disassemble this entry.

Mar 1, 2016, 7:33:28 AM - time of the request

10.240.250.23 - 54373 - client's IP and port

10.249.253.15 - server IP

- 22 - SSH port

You want to analyze packets on your wireless network. Which program would you use?

A.
Wireshark with Airpcap
A.
Wireshark with Airpcap
Answers
B.
Airsnort with Airpcap
B.
Airsnort with Airpcap
Answers
C.
Wireshark with Winpcap
C.
Wireshark with Winpcap
Answers
D.
Ethereal with Winpcap
D.
Ethereal with Winpcap
Answers
Suggested answer: A

Explanation:

https://support.riverbed.com/content/support/software/steelcentral-npm/airpcap.html Since this question refers specifically to analyzing a wireless network, it is obvious that we need an option with AirPcap (Riverbed AirPcap USB-based adapters capture 802.11 wireless traffic for analysis). Since it works with two traffic analyzers SteelCentral Packet Analyzer (Cascade Pilot) or Wireshark, the correct option would be "Wireshark with Airpcap." NOTE: AirPcap adapters no longer available for sale effective January 1, 2018, but a question on this topic may occur on your exam.

When conducting a penetration test, it is crucial to use all means to get all available information about the target network. One of the ways to do that is by sniffing the network. Which of the following cannot be performed by the passive network sniffing?

A.
Identifying operating systems, services, protocols and devices
A.
Identifying operating systems, services, protocols and devices
Answers
B.
Modifying and replaying captured network traffic
B.
Modifying and replaying captured network traffic
Answers
C.
Collecting unencrypted information about usernames and passwords
C.
Collecting unencrypted information about usernames and passwords
Answers
D.
Capturing a network traffic for further analysis
D.
Capturing a network traffic for further analysis
Answers
Suggested answer: B

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

A.
Reverse Social Engineering
A.
Reverse Social Engineering
Answers
B.
Tailgating
B.
Tailgating
Answers
C.
Piggybacking
C.
Piggybacking
Answers
D.
Announced
D.
Announced
Answers
Suggested answer: B

Explanation:

. Identifying operating systems, services, protocols and devices,

. Collecting unencrypted information about usernames and passwords,

. Capturing network traffic for further analysis are passive network sniffing methods since with the help of them we only receive information and do not make any changes to the target network. When modifying and replaying the captured network traffic, we are already starting to make changes and actively interact with it.

Which of these is capable of searching for and locating rogue access points?

A.
HIDS
A.
HIDS
Answers
B.
WISS
B.
WISS
Answers
C.
WIPS
C.
WIPS
Answers
D.
NIDS
D.
NIDS
Answers
Suggested answer: C

Explanation:

A Wireless Intrusion Prevention System (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention).

You are tasked to configure the DHCP server to lease the last 100 usable IP addresses in subnet to.

A.
4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?
A.
4.0/23. Which of the following IP addresses could be teased as a result of the new configuration?
Answers
B.
210.1.55.200
B.
210.1.55.200
Answers
C.
10.1.4.254
C.
10.1.4.254
Answers
D.
10.1.5.200
D.
10.1.5.200
Answers
E.
10.1.4.156
E.
10.1.4.156
Answers
Suggested answer: C

Explanation:

https://en.wikipedia.org/wiki/Subnetwork

As we can see, we have an IP address of 10.1.4.0 with a subnet mask of /23. According to the question, we need to determine which IP address will be included in the range of the last 100 IP addresses.

The available addresses for hosts start with 10.1.4.1 and end with 10.1.5.254. Now you can clearly see that the last 100 addresses include the address 10.1.5.200.

You want to do an ICMP scan on a remote computer using hping2. What is the proper syntax?

A.
hping2 host.domain.com
A.
hping2 host.domain.com
Answers
B.
hping2 --set-ICMP host.domain.com
B.
hping2 --set-ICMP host.domain.com
Answers
C.
hping2 -i host.domain.com
C.
hping2 -i host.domain.com
Answers
D.
hping2 -1 host.domain.com
D.
hping2 -1 host.domain.com
Answers
Suggested answer: D

Explanation:

http://www.carnal0wnage.com/papers/LSO-Hping2-Basics.pdf

Most ping programs use ICMP echo requests and wait for echo replies to come back to test connectivity. Hping2 allows us to do the same testing using any IP packet, including ICMP, UDP, and TCP. This can be helpful since nowadays most firewalls or routers block ICMP. Hping2, by default, will use TCP, but, if you still want to send an ICMP scan, you can. We send ICMP scans using the -1 (one) mode. Basically the syntax will be hping2 -1 IPADDRESS

[root@localhost hping2-rc3]# hping2 -1 192.168.0.100

HPING 192.168.0.100 (eth0 192.168.0.100): icmp mode set, 28 headers + 0 data bytes

len=46 ip=192.168.0.100 ttl=128 id=27118 icmp_seq=0 rtt=14.9 ms

len=46 ip=192.168.0.100 ttl=128 id=27119 icmp_seq=1 rtt=0.5 ms

len=46 ip=192.168.0.100 ttl=128 id=27120 icmp_seq=2 rtt=0.5 ms

len=46 ip=192.168.0.100 ttl=128 id=27121 icmp_seq=3 rtt=1.5 ms

len=46 ip=192.168.0.100 ttl=128 id=27122 icmp_seq=4 rtt=0.9 ms

— 192.168.0.100 hping statistic —

5 packets tramitted, 5 packets received, 0% packet loss

round-trip min/avg/max = 0.5/3.7/14.9 ms

[root@localhost hping2-rc3]#

An Internet Service Provider (ISP) has a need to authenticate users connecting via analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network.

Which AAA protocol is the most likely able to handle this requirement?

A.
TACACS+
A.
TACACS+
Answers
B.
DIAMETER
B.
DIAMETER
Answers
C.
Kerberos
C.
Kerberos
Answers
D.
RADIUS
D.
RADIUS
Answers
Suggested answer: D

Explanation:

https://en.wikipedia.org/wiki/RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service.

RADIUS is a client/server protocol that runs in the application layer, and can use either TCP or UDP.

Network access servers, which control access to a network, usually contain a RADIUS client component that communicates with the RADIUS server. RADIUS is often the back-end of choice for 802.1X authentication. A RADIUS server is usually a background process running on UNIX or Microsoft Windows.

Authentication and authorization The user or machine sends a request to a Network Access Server (NAS) to gain access to a particular network resource using access credentials. The credentials are passed to the NAS device via the linklayer protocol—for example, Point- to-Point Protocol (PPP) in the case of many dialup or DSL providers or posted in an HTTPS secure web form.

In turn, the NAS sends a RADIUS Access Request message to the RADIUS server, requesting authorization to grant access via the RADIUS protocol.

This request includes access credentials, typically in the form of username and password or security certificate provided by the user. Additionally, the request may contain other information which the NAS knows about the user, such as its network address or phone number, and information regarding the user's physical point of attachment to the NAS.

The RADIUS server checks that the information is correct using authentication schemes such as PAP, CHAP or EAP. The user's proof of identification is verified, along with, optionally, other information related to the request, such as the user's network address or phone number, account status, and specific network service access privileges. Historically, RADIUS servers checked the user's information against a locally stored flat-file database. Modern RADIUS servers can do this or can refer to external sources—commonly SQL, Kerberos, LDAP, or Active Directory servers—to verify the user's credentials.

The RADIUS server then returns one of three responses to the NAS:

1) Access-Reject,

2) Access-Challenge,

3) Access-Accept.

Access-Reject The user is unconditionally denied access to all requested network resources. Reasons may include failure to provide proof of identification or an unknown or inactive user account.

Access-Challenge

Requests additional information from the user such as a secondary password, PIN, token, or card.

Access-Challenge is also used in more complex authentication dialogs where a secure tunnel is established between the user machine and the Radius Server in a way that the access credentials are hidden from the NAS.

Access-Accept The user is granted access. Once the user is authenticated, the RADIUS server will often check that the user is authorized to use the network service requested. A given user may be allowed to use a company's wireless network, but not its VPN service, for example. Again, this information may be stored locally on the RADIUS server or may be looked up in an external source such as LDAP or Active Directory.

Which of the following options represents a conceptual characteristic of an anomaly-based IDS over a signature-based IDS?

A.
Produces less false positives
A.
Produces less false positives
Answers
B.
Can identify unknown attacks
B.
Can identify unknown attacks
Answers
C.
Requires vendor updates for a new threat
C.
Requires vendor updates for a new threat
Answers
D.
Cannot deal with encrypted network traffic
D.
Cannot deal with encrypted network traffic
Answers
Suggested answer: B

Explanation:

An anomaly-based intrusion detection system is an intrusion detection system for detecting both network and computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. The classification is based on heuristics or rules, rather than patterns or signatures, and attempts to detect any type of misuse that falls out of normal system operation. This is as opposed to signature-based systems, which can only detect attacks for which a signature has previously been created.

In order to positively identify attack traffic, the system must be taught to recognize normal system activity. The two phases of a majority of anomaly detection systems consist of the training phase (where a profile of normal behaviors is built) and the testing phase (where current traffic is compared with the profile created in the training phase). Anomalies are detected in several ways, most often with artificial intelligence type techniques. Systems using artificial neural networks have been used to great effect. Another method is to define what normal usage of the system comprises using a strict mathematical model, and flag any deviation from this as an attack. This is known as strict anomaly detection.[3] Other techniques used to detect anomalies include data mining methods, grammar-based methods, and the Artificial Immune System.

Network-based anomalous intrusion detection systems often provide a second line of defense to detect anomalous traffic at the physical and network layers after it has passed through a firewall or other security appliance on the border of a network. Host-based anomalous intrusion detection systems are one of the last layers of defense and reside on computer endpoints. They allow for finetuned, granular protection of endpoints at the application level.

Anomaly-based Intrusion Detection at both the network and host levels have a few shortcomings; namely a high false-positive rate and the ability to be fooled by a correctly delivered attack. Attempts have been made to address these issues through techniques used by PAYL and MCPAD.

Total 573 questions
Go to page: of 58