Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
312-50 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Testinsides ECCouncil 312-50 Dumps with VCE and PDF 211-220

September 22, 2017

EnsurePass
2017 Sep ECCouncil Official New Released 312-50
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/312-50.html

Ethical Hacking and Countermeasures

Question No: 211 – (Topic 5)

Which of the following is an attack in which a secret value like a hash is captured and then reused at a later time to gain access to a system without ever decrypting or decoding the hash.

  1. Replay Attacks

  2. Brute Force Attacks

  3. Cryptography Attacks

  4. John the Ripper Attacks

Answer: A

Explanation: A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it.

Question No: 212 – (Topic 5)

When discussing passwords, what is considered a brute force attack?

  1. You attempt every single possibility until you exhaust all possible combinations or discover the password

  2. You threaten to use the rubber hose on someone unless they reveal their password

  3. You load a dictionary of words into your cracking program

  4. You create hashes of a large number of words and compare it with the encrypted passwords

  5. You wait until the password expires

Answer: A

Explanation: Brute force cracking is a time consuming process where you try every possible combination of letters, numbers, and characters until you discover a match.

Question No: 213 – (Topic 5)

is a tool that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

  1. Trojan

  2. RootKit

  3. DoS tool

  4. Scanner

  5. Backdoor

Answer: B

Explanation: Rootkits are tools that can hide processes from the process list, can hide files, registry entries, and intercept keystrokes.

Question No: 214 – (Topic 5)

Attackers can potentially intercept and modify unsigned SMB packets, modify the traffic and forward it so that the server might perform undesirable actions.

Alternatively, the attacker could pose as the server or client after a legitimate authentication and gain unauthorized access to data. Which of the following is NOT a means that can be used to minimize or protect against such an attack?

  1. Timestamps

  2. SMB Signing

  3. File permissions

  4. Sequence numbers monitoring

Answer: A,B,D

Question No: 215 – (Topic 5)

Fingerprinting an Operating System helps a cracker because:

  1. It defines exactly what software you have installed

  2. It opens a security-delayed window based on the port being scanned

  3. It doesn#39;t depend on the patches that have been applied to fix existing security holes

  4. It informs the cracker of which vulnerabilities he may be able to exploit on your system

Answer: D

Explanation: When a cracker knows what OS and Services you use he also knows which exploits might work on your system. If he would have to try all possible exploits for all possible Operating Systems and Services it would take too long time and the possibility of being detected increases.

Question No: 216 – (Topic 5)

What hacking attack is challenge/response authentication used to prevent?

  1. Replay attacks

  2. Scanning attacks

  3. Session hijacking attacks

  4. Password cracking attacks

Answer: A

Explanation: A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it. With a challenge/response authentication you ensure that captured packets can’t be retransmitted without a new authentication.

Question No: 217 DRAG DROP – (Topic 5)

Drag the term to match with it’s description

Exhibit:

Ensurepass 2017 PDF and VCE

Answer:

Ensurepass 2017 PDF and VCE

Question No: 218 – (Topic 5)

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

  1. Copy the system files from a known good system

  2. Perform a trap and trace

  3. Delete the files and try to determine the source

  4. Reload from a previous backup

  5. Reload from known good media

Answer: E

Explanation: If a rootkit is discovered, you will need to reload from known good media. This typically means performing a complete reinstall.

Question No: 219 – (Topic 5)

In the context of password security, a simple dictionary attack involves loading a dictionary file (a text file full of dictionary words) into a cracking application such as L0phtCrack or John the Ripper, and running it against user accounts located by the application. The larger the word and word fragment selection, the more effective the dictionary attack is. The brute force method is the most inclusive, although slow. It usually tries every possible letter and number combination in its automated exploration.

If you would use both brute force and dictionary methods combined together to have variation of words, what would you call such an attack?

  1. Full Blown

  2. Thorough

  3. Hybrid

  4. BruteDics

Answer: C

Explanation: A combination of Brute force and Dictionary attack is called a Hybrid attack or Hybrid dictionary attack.

Question No: 220 – (Topic 5)

Password cracking programs reverse the hashing process to recover passwords.(True/False.

  1. True

  2. False

Answer: B

Explanation: Password cracking programs do not reverse the hashing process. Hashing

is a one-way process. What these programs can do is to encrypt words, phrases, and characters using the same encryption process and compare them to the original password. A hashed match reveals the true password.

100% Free Download!
Download Free Demo:312-50 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 312-50 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE