Free 312-50v12 Exam Braindumps

Pass your Certified Ethical Hacker Exam (CEHv12) exam with these free Questions and Answers

Page 23 of 101
QUESTION 106

- (Exam Topic 1)
The following is an entry captured by a network IDS. You are assigned the task of analyzing this entry. You notice the value 0x90, which is the most common NOOP instruction for the Intel processor. You figure that the attacker is attempting a buffer overflow attack.
You also notice "/bin/sh" in the ASCII part of the output. As an analyst what would you conclude about the attack?
312-50v12 dumps exhibit

  1. A. The buffer overflow attack has been neutralized by the IDS
  2. B. The attacker is creating a directory on the compromised machine
  3. C. The attacker is attempting a buffer overflow attack and has succeeded
  4. D. The attacker is attempting an exploit that launches a command-line shell

Correct Answer: D

QUESTION 107

- (Exam Topic 2)
Vlady works in a fishing company where the majority of the employees have very little understanding of IT let alone IT Security. Several information security issues that Vlady often found includes, employees sharing password, writing his/her password on a post it note and stick it to his/her desk, leaving the computer unlocked, didn’t log out from emails or other social media accounts, and etc.
After discussing with his boss, Vlady decided to make some changes to improve the security environment in his company. The first thing that Vlady wanted to do is to make the employees understand the importance of keeping confidential information, such as password, a secret and they should not share it with other persons.
Which of the following steps should be the first thing that Vlady should do to make the employees in his company understand to importance of keeping confidential information a secret?

  1. A. Warning to those who write password on a post it note and put it on his/her desk
  2. B. Developing a strict information security policy
  3. C. Information security awareness training
  4. D. Conducting a one to one discussion with the other employees about the importance of information security

Correct Answer: A

QUESTION 108

- (Exam Topic 1)
A hacker is an intelligent individual with excellent computer skills and the ability to explore a computer’s software and hardware without the owner’s permission. Their intention can either be to simply gain knowledge or to illegally make changes.
Which of the following class of hacker refers to an individual who works both offensively and defensively at various times?

  1. A. White Hat
  2. B. Suicide Hacker
  3. C. Gray Hat
  4. D. Black Hat

Correct Answer: C

QUESTION 109

- (Exam Topic 2)
Allen, a professional pen tester, was hired by xpertTech solutWns to perform an attack simulation on the organization's network resources. To perform the attack, he took advantage of the NetBIOS API and targeted the NetBIOS service. B/enumerating NetBIOS, he found that port 139 was open and could see the resources that could be accessed or viewed on a remote system. He came across many NetBIOS codes during enumeration.
identify the NetBIOS code used for obtaining the messenger service running for the logged-in user?

  1. A. <1B>
  2. B. <00>
  3. C. <03>
  4. D. <20>

Correct Answer: C
<03>Windows Messenger administrationCourier administration is an organization based framework notice Windows administration by Microsoft that was remembered for some prior forms of Microsoft Windows.
This resigned innovation, despite the fact that it has a comparable name, isn’t connected in any capacity to the later, Internet-based Microsoft Messenger administration for texting or to Windows Messenger and Windows Live Messenger (earlier named MSN Messenger) customer programming.
The Messenger Service was initially intended for use by framework managers to tell Windows clients about their networks.[1] It has been utilized malevolently to introduce spring up commercials to clients over the Internet (by utilizing mass-informing frameworks which sent an ideal message to a predetermined scope of IP addresses). Despite the fact that Windows XP incorporates a firewall, it isn’t empowered naturally. Along these lines, numerous clients got such messages. Because of this maltreatment, the Messenger Service has been debilitated as a matter of course in Windows XP Service Pack 2.

QUESTION 110

- (Exam Topic 3)
Stella, a professional hacker, performs an attack on web services by exploiting a vulnerability that provides additional routing information in the SOAP header to support asynchronous communication. This further allows the transmission of web-service requests and response messages using different TCP connections. Which of the following attack techniques is used by Stella to compromise the web services?

  1. A. XML injection
  2. B. WS-Address spoofing
  3. C. SOAPAction spoofing
  4. D. Web services parsing attacks

Correct Answer: B
WS-Address provides additional routing information in the SOAP header to support asynchronous communication. This technique allows the transmission of web service requests and response messages using different TCP connections
https://www.google.com/search?client=firefox-b-d&q=WS-Address+spoofing CEH V11 Module 14 Page 1896

Page 23 of 101

Post your Comments and Discuss EC-Council 312-50v12 exam with other Community members: