312-50v7 Ethical Hacking and Countermeasures V7 Part 2 Exam

Attend this 312-50v7 Ethical Hacking and Countermeasures V7 Part 2 Exam will get a Good Score 80% on main Exam

Description

Sample Questions:

What type of password cracking technique works as a dictionary attack, but adds a few numbers and symbols for words from the dictionary and try to crack your password?

dictionary attack

Brute force attacks

hybrid attack

attack style

None

What do you call a precalculated hash?

Sun Table

Apple tables,

rainbow tables

Moon table

None

Why do attackers use a proxy server?

In order to ensure that the exploits used in the attacks always gets back vectors

Faster throughput performance and increase the attack speed

Canceling traffic and route packets to the remote network of the victim in a car attacked

To hide the IP-source address, so that an attacker can crack without any legal consequences

None

SNMP Read-Only Community String, like a password. The string sent with each SNMP Get-Request and resolve (or denies) access to the device. Most network providers send their equipment with the default password “public.” This so-called “line of the default open-source community.” How would you keep the attackers to obtain confidential information about network devices using SNMP? (Select two answers)

Enable SNMPv3 authentication encrypts the user name / password

Use your company name as a public community string replaces the “public” by default

Enabling IP filtering to limit access to the SNMP devices

The default configuration provides device suppliers is very safe and you do not need to change anything

You’re writing a security policy that hardens and prevents hackers from Footprints. Which of the following solutions will not be effective against this attack?

Configure routers to limit answers to the following questions

Configure the Web server to prevent information leaks and turn off unnecessary protocols

Monitor every employee computer with spy cameras, recorders and spy on them Follow

Footprinting methods and disposal of confidential information available to the DMZ sites

None

Web wanderers or spiders are programs that traverse many pages of the World Wide Web using a recursive retrieving pages. Search engines like Google, spider the web page to be indexed. How do you stop a spider web crawl certain directories on your site?

Put the robots.txt file in the root directory of your website with a list of directories that you do not want to be scanned

Place the root directory authentication in order to prevent circumvention of these spiders

Enabling SSL on a limited directories that will block spiders crawl

Place «HTTP: NO crawl” on HTML-pages that you do not want the crawler to index

None

Hayden network security administrator for your company, a large financial services company based in Miami. Hayden had just returned from a security conference in Las Vegas, where they talked about all kinds of old and new security threats; many of whom she did not know. Hayden is concerned about the current security status of your company’s network, so she decides to start a network scan from the external IP-address. To see some of the host responds to its network it sends a SYN packet to the IP range. Several IP corresponds SYN / ACK reply. Before the connection is established, it sends RST packets to the host to stop the session. It does this in order to see how its intrusion detection system detects traffic. What Hayden scan type to try it?

Hayden tries to find live hosts in a corporate network by scanning XMAS

It uses SYN scan to find live hosts listen to its network

scanning type, it uses scan called ZERO

Hayden uses half-open scanning, to find live hosts on your network

None

If a malicious computer sends the IPID of the zombie 24333 (Idle Scan) computer with the door closed, what will be the response?

Zombie computer will respond with IPID of the 24334th

Zombie computer will respond with IPID 24,333th

Zombie computer will respond with IPID 24,333th

Zombie computer will respond with IPID of the 24335th

None

Jacob was looking through a magazine captured traffic with Wire shark. Jacob encountered that appears to form internal computer requests to the false IP-address. Jacob saw here?

Jacob see Smurf attack.

Jacob sees the SYN flood.

He sees the SYN / ACK attack.

He found evidence of ASA flood.

None

Who this course is for:

  • Those who want to get knowledge in Certifications & Check you skill Test while attend this Practice Test

Tutorial Bar
Logo