Discount Offer
Go Back on 312-50 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

312-50 Practice Test

Whether you're a beginner or brushing up on skills, our 312-50 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 26 out of 153 Pages

Topic 3, Scanning

Your are trying the scan a machine located at ABC company’s LAN named
mail.abc.com. Actually that machine located behind the firewall. Which port is used
by nmap to send the TCP synchronize frame to on mail.abc.com?


A.

443


B.

 80


C.

 8080


D.

23





A.
  

443



John is using a special tool on his Linux platform that has a signature database and
is therefore able to detect hundred of vulnerabilities in UNIX, Windows, and
commonly-used web CGI scripts. Additionally, the database detects DDoS zombies
and Trojans. What would be the name of this multifunctional tool?


A.

nmap


B.

hping


C.

 nessus


D.

make






C.
  

 nessus



Explanation: Nessus is the world's most popular vulnerability scanner, estimated to be
used by over 75,000 organizations world-wide. Nmap is mostly used for scanning, not for
detecting vulnerabilities. Hping is a free packet generator and analyzer for the TCP/IP
protocol and make is used to automatically build large applications on the *nix plattform.

Which of the following are potential attacks on cryptography? (Select 3)


A.

One-Time-Pad Attack


B.

Chosen-Ciphertext Attack


C.

 Man-in-the-Middle Attack


D.

Known-Ciphertext Attack


E.

Replay Attack





B.
  

Chosen-Ciphertext Attack



C.
  

 Man-in-the-Middle Attack



E.
  

Replay Attack



Explanation: A chosen-ciphertext attack (CCA) is an attack model for cryptanalysis in
which the cryptanalyst chooses a ciphertext and causes it to be decrypted with an unknown
key. Specific forms of this attack are sometimes termed "lunchtime" or "midnight" attacks,
referring to a scenario in which an attacker gains access to an unattended decryption
machine. In cryptography, a man-in-the-middle attack (MITM) is an attack in which an
attacker is able to read, insert and modify at will, messages between two parties without
either party knowing that the link between them has been compromised. The attacker must
be able to observe and intercept messages going between the two victims. A replay attack
is a form of network attack in which a valid data transmission is maliciously or fraudulently
repeated or delayed. This is carried out either by the originator or by an adversary who
intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet
substitution (such as stream cipher attack).

Samantha has been actively scanning the client network for which she is doing a
vulnerability assessment test. While doing a port scan she notices ports open in the
135 to 139 range. What protocol is most likely to be listening on those ports?


A.

SMB


B.

 FTP


C.

SAMBA


D.

 FINGER





A.
  

SMB



Explanation: Port 135 is for RPC and 136-139 is for NetBIOS traffic. SMB is an upper
layer service that runs on top of the Session Service and the Datagram service of NetBIOS.

John has a proxy server on his network which caches and filters web access. He
shuts down all unnecessary ports and services. Additionally, he has installed a
firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack,
a network user has successfully connected to a remote server on port 80 using
netcat. He could in turn drop a shell from the remote machine. Assuming an attacker
wants to penetrate John's network, which of the following options is he likely to
choose?


A.

Use ClosedVPN


B.

Use Monkey shell


C.

Use reverse shell using FTP protocol


D.

 Use HTTPTunnel or Stunnel on port 80 and 443





D.
  

 Use HTTPTunnel or Stunnel on port 80 and 443



Explanation: As long as you allow http or https traffic attacks can be tunneled over those
protocols with Stunnel or HTTPTunnel.


Page 26 out of 153 Pages
Previous