Certified Ethical Hacker 312-50v10 – Question172

You have successfully compromised a machine on the network and found a server that is alive on the same network. You tried to ping it but you didn't get any response back.

What is happening?


A.
ICMP could be disabled on the target server.
B. The ARP is disabled on the target server.
C. TCP/IP doesn't support ICMP.
D. You need to run the ping command with root privileges.

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question171

A tester has been hired to do a web application security test. The tester notices that the site is dynamic and must make use of a back end database. In order for the tester to see if SQL injection is possible, what is the first character that the tester should use to attempt breaking a valid SQL request?


A.
Semicolon
B. Single quote
C. Exclamation mark
D. Double quote

Correct Answer: B

Certified Ethical Hacker 312-50v10 – Question169

Scenario:

1. Victim opens the attacker's web site.
2. Attacker sets up a web site which contains interesting and attractive content like 'Do you want to make $1000 in a day?'.
3. Victim clicks to the interesting and attractive content URL.
4. Attacker creates a transparent 'iframe' in front of the URL which victim attempts to click, so victim thinks that he/she clicks to the 'Do you want to make $1000 in a day?' url but actually he/she clicks to the content or UPL that exists in the transparent 'iframe' which is setup by the attacker.
What is the name of the attack which is mentioned in the scenario?


A.
Session Fixation
B. HTML Injection
C. HTTP Parameter Pollution
D. Clickjacking Attack

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question168

Which of the following programming languages is most susceptible to buffer overflow attacks, due to its lack of a built-in bounds checking mechanism?

Code:
#include <string.h>
int main(){
char buffer[8];
strcpy(buffer, 11111111111111111111111111111);
}
Output:
Segmentation fault


A.
C#
B. Python
C. Java
D. C++

Correct Answer: D

Certified Ethical Hacker 312-50v10 – Question167

What does a firewall check to prevent particular ports and applications from getting packets into an organization?


A.
Transport layer port numbers and application layer headers
B. Presentation layer headers and the session layer port numbers
C. Network layer headers and the session layer port numbers
D. Application layer port numbers and the transport layer headers

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question166

What is correct about digital signatures?


A.
A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.
B. Digital signatures may be used in different documents of the same type.
C. A digital signature cannot be moved from one signed document to another because it is a plain hash of the document content.
D. Digital signatures are issued once for each user and can be used everywhere until they expire.

Correct Answer: A

Certified Ethical Hacker 312-50v10 – Question165

A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client.
What is a possible source of this problem?


A.
The WAP does not recognize the clients MAC address
B. The client cannot see the SSID of the wireless network
C. Client is configured for the wrong channel
D. The wireless client is not configured to use DHCP

Correct Answer: A