ExamGecko
Home Home / ECCouncil / 312-50v12

ECCouncil 312-50v12 Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Related questions











What type of a vulnerability/attack is it when the malicious person forces the user's browser to send an authenticated request to a server?

A.
Session hijacking
A.
Session hijacking
Answers
B.
Server side request forgery
B.
Server side request forgery
Answers
C.
Cross-site request forgery
C.
Cross-site request forgery
Answers
D.
Cross-site scripting
D.
Cross-site scripting
Answers
Suggested answer: C

Websites and web portals that provide web services commonly use the Simple Object Access Protocol (SOAP).

Which of the following is an incorrect definition or characteristics of the protocol?

A.
Exchanges data between web services
A.
Exchanges data between web services
Answers
B.
Only compatible with the application protocol HTTP
B.
Only compatible with the application protocol HTTP
Answers
C.
Provides a structured model for messaging
C.
Provides a structured model for messaging
Answers
D.
Based on XML
D.
Based on XML
Answers
Suggested answer: B

A Security Engineer at a medium-sized accounting firm has been tasked with discovering how much information can be obtained from the firm's public facing web servers. The engineer decides to start by using netcat to port 80.

The engineer receives this output:

HTTP/1.1 200 OK

Server: Microsoft-IIS/6

Expires: Tue, 17 Jan 2011 01:41:33 GMT

Date: Mon, 16 Jan 2011 01:41:33 GMT

Content-Type: text/html

Accept-Ranges: bytes

Last Modified: Wed, 28 Dec 2010 15:32:21 GMT

ETag:"b0aac0542e25c31:89d"

Content-Length: 7369

Which of the following is an example of what the engineer performed?

A.
Banner grabbing
A.
Banner grabbing
Answers
B.
SQL injection
B.
SQL injection
Answers
C.
Whois database query
C.
Whois database query
Answers
D.
Cross-site scripting
D.
Cross-site scripting
Answers
Suggested answer: A

The network in PLUS company is using the network address 192.168.1.64 with mask 255.255.255.192.

In the network the servers are in the addresses 192.168.1.122, 192.168.1.123 and 192.168.1.124. An attacker is trying to find those servers but he cannot see them in his scanning. The command he is using is: nmap 192.168.1.64/28.

Why he cannot see the servers?

A.
He needs to add the command ""ip address"" just before the IP address
A.
He needs to add the command ""ip address"" just before the IP address
Answers
B.
He needs to change the address to 192.168.1.0 with the same mask
B.
He needs to change the address to 192.168.1.0 with the same mask
Answers
C.
He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range
C.
He is scanning from 192.168.1.64 to 192.168.1.78 because of the mask /28 and the servers are not in that range
Answers
D.
The network must be dawn and the nmap command and IP address are ok
D.
The network must be dawn and the nmap command and IP address are ok
Answers
Suggested answer: C

Explanation:

https://en.wikipedia.org/wiki/Subnetwork

This is a fairly simple question. You must to understand what a subnet mask is and how it works.

A subnetwork or subnet is a logical subdivision of an IP network.The practice of dividing a network into two or more networks is called subnetting.

Computers that belong to the same subnet are addressed with an identical most-significant bit-group in their IP addresses. This results in the logical division of an IP address into two fields: the network number or routing prefix and the rest field or host identifier. The rest field is an identifier for a specific host or network interface.

The routing prefix may be expressed in Classless Inter-Domain Routing (CIDR) notation written as the first address of a network, followed by a slash character (/), and ending with the bit-length of the prefix. For example, 198.51.100.0/24 is the prefix of the Internet Protocol version 4 network starting at the given address, having 24 bits allocated for the network prefix, and the remaining 8 bits reserved for host addressing. Addresses in the range 198.51.100.0 to 198.51.100.255 belong to this network. The IPv6 address specification 2001:db8::/32 is a large address block with 296 addresses, having a 32-bit routing prefix.

For IPv4, a network may also be characterized by its subnet mask or netmask, which is the bitmask that when applied by a bitwise AND operation to any IP address in the network, yields the routing prefix. Subnet masks are also expressed in dot-decimal notation like an address. For example, 255.255.255.0 is the subnet mask for the prefix 198.51.100.0/24.

An attacker changes the profile information of a particular user (victim) on the target website. The attacker uses this string to update the victim's profile to a text file and then submit the data to the attacker's database.

< iframe src=""http://www.vulnweb.com/updateif.php"" style=""display:none"" > < /iframe > What is this type of attack (that can use either HTTP GET or HTTP POST) called?

A.
Browser Hacking
A.
Browser Hacking
Answers
B.
Cross-Site Scripting
B.
Cross-Site Scripting
Answers
C.
SQL Injection
C.
SQL Injection
Answers
D.
Cross-Site Request Forgery
D.
Cross-Site Request Forgery
Answers
Suggested answer: D

Explanation:

https://book.hacktricks.xyz/pentesting-web/csrf-cross-site-request-forgery Cross-site request forgery (also known as CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform.

This is done by making a logged in user in the victim platform access an attacker controlled website and from there execute malicious JS code, send forms or retrieve "images" to the victims account.

In order to be able to abuse a CSRF vulnerability you first need to find a relevant action to abuse (change password or email, make the victim follow you on a social network, give you more privileges...). The session must rely only on cookies or HTTP Basic Authentication header, any other header can't be used to handle the session. An finally, there shouldn't be unpredictable parameters on the request.

Several counter-measures could be in place to avoid this vulnerability. Common defenses:

- SameSite cookies: If the session cookie is using this flag, you may not be able to send the cookie from arbitrary web sites.

- Cross-origin resource sharing: Depending on which kind of HTTP request you need to perform toabuse the relevant action, you may take int account the CORS policy of the victim site. Note that theCORS policy won't affect if you just want to send a GET request or a POST request from a form andyou don't need to read the response.

- Ask for the password user to authorise the action.

- Resolve a captcha

- Read the Referrer or Origin headers. If a regex is used it could be bypassed form example with:

http://mal.net?orig=http://example.com (ends with the url)

http://example.com.mal.net (starts with the url)

- Modify the name of the parameters of the Post or Get request

- Use a CSRF token in each session. This token has to be send inside the request to confirm the action. This token could be protected with CORS.

Which Metasploit Framework tool can help penetration tester for evading Anti-virus Systems?

A.
msfpayload
A.
msfpayload
Answers
B.
msfcli
B.
msfcli
Answers
C.
msfd
C.
msfd
Answers
D.
msfencode
D.
msfencode
Answers
Suggested answer: D

Explanation:

https://www.offensive-security.com/metasploit-unleashed/msfencode/ One of the best ways to avoid being stopped by antivirus software is to encode our payload with msfencode. Msfencode is a useful tool that alters the code in an executable so that it looks different to antivirus software but will still run the same way. Much as the binary attachment in email is encoded in Base64, msfencode encodes the original executable in a new binary. Then, when the executable is run, msfencode decodes the original code into memory and exe-cutes it.

Incorrect answers: msfpayload https://www.offensive-security.com/metasploit-unleashed/msfpayload/ MSFpayload is a command line instance of Metasploit that is used to generate and output all of the various types of shellcode that are available in Metasploit. The most common use of this tool is for the generation of shellcode for an exploit that is not currently in the Metasploit Framework or for testing different types of shellcode and options before finalizing an Exploit Module. msfcli https://www.offensive-security.com/metasploit-unleashed/msfcli/ The msfcli provides a powerful command line interface to the framework. This allows you to easily add Metasploit exploits into any scripts you may create.

When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities.

You can test parameter and headers manually to get more precise results than if using web vulnerability scanners.

What proxy tool will help you find web vulnerabilities?

A.
Maskgen
A.
Maskgen
Answers
B.
Dimitry
B.
Dimitry
Answers
C.
Burpsuite
C.
Burpsuite
Answers
D.
Proxychains
D.
Proxychains
Answers
Suggested answer: C

Which Nmap option would you use if you were not concerned about being detected and wanted to perform a very fast scan?

A.
-T5
A.
-T5
Answers
B.
-O
B.
-O
Answers
C.
-T0
C.
-T0
Answers
D.
-A
D.
-A
Answers
Suggested answer: A

Geena, a cloud architect, uses a master component in the Kubernetes cluster architecture that scans newly generated pods and allocates a node to them. This component can also assign nodes based on factors such as the overall resource requirement, data locality, software/hardware/policy restrictions, and internal workload interventions.

Which of the following master components is explained in the above scenario?

A.
Kube-controller-manager
A.
Kube-controller-manager
Answers
B.
Kube-scheduler
B.
Kube-scheduler
Answers
C.
Kube-apiserver
C.
Kube-apiserver
Answers
D.
Etcd cluster
D.
Etcd cluster
Answers
Suggested answer: B

_________ is a type of phishing that targets high-profile executives such as CEOs, CFOs, politicians, and celebrities who have access to confidential and highly valuable information.

A.
Spear phishing
A.
Spear phishing
Answers
B.
Whaling
B.
Whaling
Answers
C.
Vishing
C.
Vishing
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: B
Total 573 questions
Go to page: of 58