[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-50 Dumps with VCE and PDF 321-330

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-50
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures

Question No: 321 – (Topic 9)

Jack Hackers wants to break into Brown’s Computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co. pretending to be an administrator from Brown Co. Jack tell Jane that there has been a problem with some accounts and asks her to verify her password with him “just to double check our records”. Jane does not suspect anything amiss and parts her password. Jack can now access Brown Co.’s computer with a valid username and password to steal the cookie recipe. What kind of attack is being illustrated here?

  1. Faking Identity

  2. Spoofing Identity

  3. Social Engineering

  4. Reverse Psychology

  5. Reverse Engineering

Answer: C

Explanation: Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access and in most cases the attacker never comes face-to-face with the victim.

Topic 10, Session Hijacking

Question No: 322 – (Topic 10)

What is the key advantage of Session Hijacking?

  1. It can be easily done and does not require sophisticated skills.

  2. You can take advantage of an authenticated connection.

  3. You can successfully predict the sequence number generation.

  4. You cannot be traced in case the hijack is detected.

Answer: B

Explanation: As an attacker you don’t have to steal an account and password in order to take advantage of an authenticated connection.

Question No: 323 – (Topic 10)

What type of cookies can be generated while visiting different web sites on the Internet?

  1. Permanent and long term cookies.

  2. Session and permanent cookies.

  3. Session and external cookies.

  4. Cookies are all the same, there is no such thing as different type of cookies.

Answer: B

Explanation: There are two types of cookies: a permanent cookie that remains on a visitor#39;s computer for a given time and a session cookie the is temporarily saved in the visitor#39;s computer memory during the time that the visitor is using the Web site. Session cookies disappear when you close your Web browser.

Question No: 324 – (Topic 10)

What is Hunt used for?

  1. Hunt is used to footprint networks

  2. Hunt is used to sniff traffic

  3. Hunt is used to hack web servers

  4. Hunt is used to intercept traffic i.e. man-in-the-middle traffic

  5. Hunt is used for password cracking

Answer: D

Explanation: Hunt can be used to intercept traffic. It is useful with telnet, ftp, and others to grab traffic between two computers or to hijack sessions.

Question No: 325 – (Topic 10)

After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledge (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen and then opens a second connection from a forget IP address. The attack doesn’t see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP Address is used for authentication, the attacker can use the one-side communication to break into the server.

What attacks can you successfully launch against a server using the above technique?

  1. Session Hijacking attacks

  2. Denial of Service attacks

  3. Web Page defacement attacks

  4. IP Spoofing Attacks

Answer: A

Explanation: The term Session Hijacking refers to the exploitation of a valid computer session – sometimes also called a session key – to gain unauthorised access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim#39;s computer.

Question No: 326 – (Topic 10)

John is using tokens for the purpose of strong authentication. He is not confident that his security is considerably strong.

In the context of Session hijacking why would you consider this as a false sense of security?

  1. The token based security cannot be easily defeated.

  2. The connection can be taken over after authentication.

  3. A token is not considered strong authentication.

  4. Token security is not widely used in the industry.

Answer: B

Explanation: A token will give you a more secure authentication, but the tokens will not help against attacks that are directed against you after you have been authenticated.

Question No: 327 – (Topic 10)

You want to carry out session hijacking on a remote server. The server and the client are communicating via TCP after a successful TCP three way handshake. The server has just received packet #120 from the client. The client has a receive window of 200 and the server has a receive window of 250.

Within what range of sequence numbers should a packet, sent by the client fall in order to be accepted by the server?

A. 200-250

B. 121-371

C. 120-321

D. 121-231

E. 120-370

Answer: B

Explanation: Package number 120 have already been received by the server and the window is 250 packets, so any package number from 121 (next in sequence) to 371 (121 250).

Question No: 328 – (Topic 10)

Which of the following attacks takes best advantage of an existing authenticated connection

  1. Spoofing

  2. Session Hijacking

  3. Password Sniffing

  4. Password Guessing

Answer: B

Explanation: Session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user#39;s Web application session while that session is still in progress.

Question No: 329 – (Topic 10)

How would you prevent session hijacking attacks?

  1. Using biometrics access tokens secures sessions against hijacking

  2. Using non-Internet protocols like http secures sessions against hijacking

  3. Using hardware-based authentication secures sessions against hijacking

  4. Using unpredictable sequence numbers secures sessions against hijacking

Answer: D

Explanation: Protection of a session needs to focus on the unique session identifier because it is the only thing that distinguishes users. If the session ID is compromised, attackers can impersonate other users on the system. The first thing is to ensure that the sequence of identification numbers issued by the session management system is unpredictable; otherwise, it#39;s trivial to hijack another user#39;s session. Having a large number of possible session IDs (meaning that they should be very long) means that there are a lot more permutations for an attacker to try.

Question No: 330 – (Topic 10)

Bob is going to perform an active session hijack against company. He has acquired the target that allows session oriented connections (Telnet) and performs sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network.

So, what is Bob most likely to do next?

  1. Take over the session.

  2. Reverse sequence prediction.

  3. Guess the sequence numbers.

  4. Take one of the parties’ offline.

Answer: C

100% Ensurepass Free Download!
Download Free Demo:312-50 Demo PDF
100% Ensurepass Free Guaranteed!
312-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No