Latest Certified Success Dumps Download

312-50 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Testinsides ECCouncil 312-50 Dumps with VCE and PDF 361-370

September 22, 2017

2017 Sep ECCouncil Official New Released 312-50
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures

Question No: 361 – (Topic 12)

Liza has forgotten her password to an online bookstore. The web application asks her to key in her email so that they can send her the password. Liza enters her email;. The application displays server error. What is wrong with the web application?

  1. The email is not valid

  2. User input is not sanitized

  3. The web server may be down

  4. The ISP connection is not reliable

Answer: B

Explanation: All input from web browsers, such as user data from HTML forms and cookies, must be stripped of special characters and HTML tags as described in the following CERT advisories:

Question No: 362 – (Topic 12)

Bret is a web application administrator and has just read that there are a number of surprisingly common web application vulnerabilities that can be exploited by unsophisticated attackers with easily available tools on the Internet.

He has also read that when an organization deploys a web application, they invite the world to send HTTP requests. Attacks buried in these requests sail past firewalls, filters, platform hardening, SSL, and IDS without notice because they are inside legal HTTP requests. Bret is determined to weed out any vulnerabilities. What are some common vulnerabilities in web applications that he should be concerned about?

  1. Non-validated parameters, broken access control, broken account and session management, cross-side scripting and buffer overflows are just a few common vulnerabilities

  2. No IDS configured, anonymous user account set as default, missing latest security patch, no firewall filters set and visible clear text passwords are just a few common vulnerabilities

  3. Visible clear text passwords, anonymous user account set as default, missing latest security patch, no firewall filters set and no SSL configured are just a few common vulnerabilities

  4. No SSL configured, anonymous user account set as default, missing latest security patch, no firewall filters set and an inattentive system administrator are just a few common vulnerabilities

Answer: A

Question No: 363 – (Topic 12)

What does black box testing mean?

  1. You have full knowledge of the environment

  2. You have no knowledge of the environment

  3. You have partial knowledge of the environment

Answer: B

Explanation: Black box testing is conducted when you have no knowledge of the environment. It is more time consuming and expensive.

Question No: 364 – (Topic 12)

Bob is a very security conscious computer user. He plans to test a site that is known to have malicious applets, code, and more. Bob always make use of a basic Web Browser to perform such testing.

Which of the following web browser can adequately fill this purpose?

  1. Internet Explorer

  2. Mozila

  3. Lynx

  4. Tiger

Answer: C

Explanation: Lynx is a program used to browse the World Wide Web, which works on simple text terminals, rather than requiring a graphical computer display terminal.

Question No: 365 – (Topic 12)

Clive has been hired to perform a Black-Box test by one of his clients.

How much information will Clive obtain from the client before commencing his test?

  1. IP Range, OS, and patches installed.

  2. Only the IP address range.

  3. Nothing but corporate name.

  4. All that is available from the client site.

Answer: C

Explanation: Penetration tests can be conducted in one of two ways: black-box (with no prior knowledge the infrastructure to be tested) or white-box (with complete knowledge of the infrastructure to be tested). As you might expect, there are conflicting opinions about this choice and the value that either approach will bring to a project.

Question No: 366 – (Topic 12)

Kevin has been asked to write a short program to gather user input for a web application. He likes to keep his code neat and simple. He chooses to use printf(str) where he should have ideally used printf(?s? str). What attack will his program expose the web application to?

  1. Cross Site Scripting

  2. SQL injection Attack

  3. Format String Attack

  4. Unicode Traversal Attack

Answer: C

Explanation: Format string attacks are a new class of software vulnerability discovered around 1999, previously thought harmless. Format string attacks can be used to crash a program or to execute harmful code. The problem stems from the use of unfiltered user input as the format string parameter in certain C functions that perform formatting, such as printf(). A malicious user may use the %s and %x format tokens, among others, to print data from the stack or possibly other locations in memory. One may also write arbitrary data to arbitrary locations using the %n format token, which commands printf() and similar functions to write back the number of bytes formatted to the same argument to printf(), assuming that the corresponding argument exists, and is of type int * .

Question No: 367 – (Topic 12)

Consider the following code:

Ensurepass 2017 PDF and VCE

If an attacker can trick a victim user to click a link like this and the web application does not validate input, then the victim’s browser will pop up an alert showing the users current set of cookies. An attacker can do much more damage, including stealing passwords, resetting your home page or redirecting the user to another web site.

What is the countermeasure against XSS scripting?

  1. Create an IP access list and restrict connections based on port number

  2. Replace “lt;” and “gt;” characters with ?lt; and ?gt; using server scripts

  3. Disable Javascript in IE and Firefox browsers

  4. Connect to the server using HTTPS protocol instead of HTTP

Answer: B

Explanation: The correct answer contains a string which is an HTML-quoted version of the original script. The quoted versions of these characters will appear as literals in a browser, rather than with their special meaning as HTML tags. This prevents any script from being injected into HTML output, but it also prevents any user-supplied input from being formatted with benign HTML.

Question No: 368 – (Topic 12)

While testing web applications, you attempt to insert the following test script into the search area on the company#39;s web site:

lt;scriptgt;alert(#39;Testing Testing Testing#39;)lt;/scriptgt;

Afterwards, when you press the search button, a pop up box appears on your screen with the text quot;Testing Testing Testingquot;. What vulnerability is detected in the web application here?

  1. A hybrid attack

  2. A buffer overflow

  3. Password attacks

  4. Cross Site Scripting

Answer: D

Explanation: Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy.

Question No: 369 – (Topic 12)

Ensurepass 2017 PDF and VCE

What attack is being depicted here?

  1. Cookie Stealing

  2. Session Hijacking

  3. Cross Site scripting

  4. Parameter Manipulation

Answer: D

Explanation: Manipulating the data sent between the browser and the web application to an attacker#39;s advantage has long been a simple but effective way to make applications do things in a way the user often shouldn#39;t be able to. In a badly designed and developed web application, malicious users can modify things like prices in web carts, session tokens or values stored in cookies and even HTTP headers. In this case the user has elevated his rights.

Question No: 370 – (Topic 12)

Annie has just succeeded is stealing a secure cookie via a XSS attack. She is able to replay the cookie even while the session is valid on the server. Why do you think this is possible?

  1. Any Cookie can be replayed irrespective of the session status

  2. The scenario is invalid as a secure cookie can’t be replayed

  3. It works because encryption is performed at the network layer (layer 1 encryption)

  4. It works because encryption is performed at the application layer (Single Encryption Key)

Answer: D

Explanation: Single key encryption (conventional cryptography) uses a single word or phrase as the key. The same key is used by the sender to encrypt and the receiver to decrypt. Sender and receiver initially need to have a secure way of passing the key from one to the other. With TLS or SSL this would not be possible.

100% Free Download!
Download Free Demo:312-50 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass 312-50 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE