Discount Offer
Go Back on 312-50 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

312-50 Practice Test

Whether you're a beginner or brushing up on skills, our 312-50 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 28 out of 153 Pages

Topic 19, Evading IDS, Firewalls and Honeypots

Statistics from cert.org and other leading security organizations has clearly showed
a steady rise in the number of hacking incidents perpetrated against companies.
What do you think is the main reason behind the significant increase in hacking
attempts over the past years?


A.

A. It is getting more challenging and harder to hack for non technical people.


B.

There is a phenomenal increase in processing power.


C.

New TCP/IP stack features are constantly being added.


D.

The ease with which hacker tools are available on the Internet.





D.
  

The ease with which hacker tools are available on the Internet.



Explanation: Today you dont need to be a good hacker in order to break in to various
systems, all you need is the knowledge to use search engines on the internet.

Jack is conducting a port scan of a target network. He knows that his target network
has a web server and that a mail server is up and running. Jack has been sweeping
the network but has not been able to get any responses from the remote target.
Check all of the following that could be a likely cause of the lack of response?


A.

The host might be down


B.

 UDP is filtered by a gateway


C.

 ICMP is filtered by a gateway


D.

 The TCP window Size does not match


E.

The destination network might be down


F.

 The packet TTL value is too low and can’t reach the target





A.
  

The host might be down



C.
  

 ICMP is filtered by a gateway



E.
  

The destination network might be down



F.
  

 The packet TTL value is too low and can’t reach the target



Explanation: Wrong answers is B and D as sweeping a network uses ICMP

To scan a host downstream from a security gateway, Firewalking:


A.

Sends a UDP-based packet that it knows will be blocked by the firewall to determine
how specifically the firewall responds to such packets


B.

 Uses the TTL function to send packets with a TTL value set to expire one hop past the
identified security gateway


C.

Sends an ICMP ''administratively prohibited'' packet to determine if the gateway will drop
the packet without comment.


D.

Assesses the security rules that relate to the target system before it sends packets to
any hops on the route to the gateway





B.
  

 Uses the TTL function to send packets with a TTL value set to expire one hop past the
identified security gateway



Explanation: Firewalking uses a traceroute-like IP packet analysis to determine whether or
not a particular packet can pass from the attackers host to a destination host through a
packet-filtering device. This technique can be used to map open or pass through ports on
a gateway. More over, it can determine whether packets with various control information
can pass through a given gateway.

Which of the following would be the best reason for sending a single SMTP message
to an address that does not exist within the target company?


A.

To create a denial of service attack.


B.

To verify information about the mail administrator and his address.


C.

 To gather information about internal hosts used in email treatment.


D.

To gather information about procedures that are in place to deal with such messages.






C.
  

 To gather information about internal hosts used in email treatment.



Explanation: The replay from the email server that states that there is no such recipient
will also give you some information about the name of the email server, versions used and
so on.

Paula works as the primary help desk contact for her company. Paula has just
received a call from a user reporting that his computer just displayed a Blue Screen
of Death screen and he ca no longer work. Paula walks over to the user’s computer
and sees the Blue Screen of Death screen. The user’s computer is running Windows
XP, but the Blue screen looks like a familiar one that Paula had seen a Windows 2000
Computers periodically.
The user said he stepped away from his computer for only 15 minutes and when he
got back, the Blue Screen was there. Paula also noticed that the hard drive activity
light was flashing meaning that the computer was processing some thing. Paula
knew this should not be the case since the computer should be completely frozen
during a Blue screen. She checks the network IDS live log entries and notices
numerous nmap scan alerts.
What is Paula seeing happen on this computer?


A.

Paula’s Network was scanned using FloppyScan


B.

 Paula’s Netwrok was scanned using Dumpsec


C.

 There was IRQ conflict in Paula’s PC


D.

Tool like Nessus will cause BSOD






A.
  

Paula’s Network was scanned using FloppyScan



Explanation: Floppyscan is a dangerous hacking tool which can be used to portscan a
system using a floppy disk Bootsup mini Linux Displays Blue screen of death screen Port scans the network using NMAP Send the results by e-mail to a remote server.


Page 28 out of 153 Pages
Previous