Attend this 312-50v7 Ethical Hacking and Countermeasures V7 Part 2 Exam will get a Good Score 80% on main Exam
Description
Sample Questions:
What type of password cracking technique works as a dictionary attack, but adds a few numbers and symbols for words from the dictionary and try to crack your password?
dictionary attack
Brute force attacks
hybrid attack
attack style
None
What do you call a precalculated hash?
Sun Table
Apple tables,
rainbow tables
Moon table
None
Why do attackers use a proxy server?
In order to ensure that the exploits used in the attacks always gets back vectors
Faster throughput performance and increase the attack speed
Canceling traffic and route packets to the remote network of the victim in a car attacked
To hide the IP-source address, so that an attacker can crack without any legal consequences
None
SNMP Read-Only Community String, like a password. The string sent with each SNMP Get-Request and resolve (or denies) access to the device. Most network providers send their equipment with the default password “public.” This so-called “line of the default open-source community.” How would you keep the attackers to obtain confidential information about network devices using SNMP? (Select two answers)
Enable SNMPv3 authentication encrypts the user name / password
Use your company name as a public community string replaces the “public” by default
Enabling IP filtering to limit access to the SNMP devices
The default configuration provides device suppliers is very safe and you do not need to change anything
You’re writing a security policy that hardens and prevents hackers from Footprints. Which of the following solutions will not be effective against this attack?
Configure routers to limit answers to the following questions
Configure the Web server to prevent information leaks and turn off unnecessary protocols
Monitor every employee computer with spy cameras, recorders and spy on them Follow
Footprinting methods and disposal of confidential information available to the DMZ sites
None
Web wanderers or spiders are programs that traverse many pages of the World Wide Web using a recursive retrieving pages. Search engines like Google, spider the web page to be indexed. How do you stop a spider web crawl certain directories on your site?
Put the robots.txt file in the root directory of your website with a list of directories that you do not want to be scanned
Place the root directory authentication in order to prevent circumvention of these spiders
Enabling SSL on a limited directories that will block spiders crawl
Place «HTTP: NO crawl” on HTML-pages that you do not want the crawler to index
None
Hayden network security administrator for your company, a large financial services company based in Miami. Hayden had just returned from a security conference in Las Vegas, where they talked about all kinds of old and new security threats; many of whom she did not know. Hayden is concerned about the current security status of your company’s network, so she decides to start a network scan from the external IP-address. To see some of the host responds to its network it sends a SYN packet to the IP range. Several IP corresponds SYN / ACK reply. Before the connection is established, it sends RST packets to the host to stop the session. It does this in order to see how its intrusion detection system detects traffic. What Hayden scan type to try it?
Hayden tries to find live hosts in a corporate network by scanning XMAS
It uses SYN scan to find live hosts listen to its network
scanning type, it uses scan called ZERO
Hayden uses half-open scanning, to find live hosts on your network
None
If a malicious computer sends the IPID of the zombie 24333 (Idle Scan) computer with the door closed, what will be the response?
Zombie computer will respond with IPID of the 24334th
Zombie computer will respond with IPID 24,333th
Zombie computer will respond with IPID 24,333th
Zombie computer will respond with IPID of the 24335th
None
Jacob was looking through a magazine captured traffic with Wire shark. Jacob encountered that appears to form internal computer requests to the false IP-address. Jacob saw here?
Jacob see Smurf attack.
Jacob sees the SYN flood.
He sees the SYN / ACK attack.
He found evidence of ASA flood.
None
Total Students | 10 |
---|---|
Original Price($) | |
Sale Price | Free |
Number of lectures | 0 |
Number of quizzes | 4 |
Total Reviews | 0 |
Global Rating | 0 |
Instructor Name | Ssk Solutions |
Reminder – Rate this Premium 100% off Udemy Course on Udemy that you got for FREEE!!