Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 11 of 101
QUESTION 46

- (Exam Topic 3)
Samuel, a professional hacker, monitored and Intercepted already established traffic between Bob and a host machine to predict Bob's ISN. Using this ISN, Samuel sent spoofed packets with Bob's IP address to the host machine. The host machine responded with <| packet having an Incremented ISN. Consequently. Bob's connection got hung, and Samuel was able to communicate with the host machine on behalf of Bob. What is the type of attack performed by Samuel in the above scenario?

  1. A. UDP hijacking
  2. B. Blind hijacking
  3. C. TCP/IP hacking
  4. D. Forbidden attack

Correct Answer: C
A TCP/IP hijack is an attack that spoofs a server into thinking it’s talking with a sound client, once actually it’s communication with an assaulter that has condemned (or hijacked) the tcp session. Assume that the client has administrator-level privileges, which the attacker needs to steal that authority so as to form a brand new account with root-level access of the server to be used afterward. A tcp Hijacking is sort of a two-phased man-in-the-middle attack. The man-in-the-middle assaulter lurks within the circuit between a shopper and a server so as to work out what port and sequence numbers are being employed for the conversation.
First, the attacker knocks out the client with an attack, like Ping of Death, or ties it up with some reasonably ICMP storm. This renders the client unable to transmit any packets to the server. Then, with the client crashed, the attacker assumes the client’s identity so as to talk with the server. By this suggests, the attacker gains administrator-level access to the server.
One of the most effective means of preventing a hijack attack is to want a secret, that’s a shared secret
between the shopper and also the server. looking on the strength of security desired, the key may be used for random exchanges. this is often once a client and server periodically challenge each other, or it will occur with each exchange, like Kerberos.

QUESTION 47

- (Exam Topic 2)
What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

  1. A. Copy the system files from a known good system
  2. B. Perform a trap and trace
  3. C. Delete the files and try to determine the source
  4. D. Reload from a previous backup
  5. E. Reload from known good media

Correct Answer: E

QUESTION 48

- (Exam Topic 1)
What is a NULL scan?

  1. A. A scan in which all flags are turned off
  2. B. A scan in which certain flags are off
  3. C. A scan in which all flags are on
  4. D. A scan in which the packet size is set to zero
  5. E. A scan with an illegal packet size

Correct Answer: A

QUESTION 49

- (Exam Topic 3)
A computer science student needs to fill some information into a secured Adobe PDF job application that was received from a prospective employer. Instead of requesting a new document that allowed the forms to be completed, the student decides to write a script that pulls passwords from a list of commonly used passwords to try against the secured PDF until the correct password is found or the list is exhausted.
Which cryptography attack is the student attempting?

  1. A. Man-in-the-middle attack
  2. B. Brute-force attack
  3. C. Dictionary attack
  4. D. Session hijacking

Correct Answer: C

QUESTION 50

- (Exam Topic 2)
What kind of detection techniques is being used in antivirus softwares that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it's made on the premiers environment

  1. A. VCloud based
  2. B. Honypot based
  3. C. Behaviour based
  4. D. Heuristics based

Correct Answer: A

Page 11 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: