Certified Ethical Hacker – CEH – 312-50 – Question192

The Open Web Application Security Project (OWASP) testing methodology addresses the need to secure web applications by providing which one of the following services?


A.
An extensible security framework named COBIT
B. A list of flaws and how to fix them
C. Web application patches
D. A security certification for hardened web applications

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question190

While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site:
<script>alert(" Testing Testing Testing ")</script>
Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?


A.
Buffer overflow
B. Cross-site request forgery
C. Distributed denial of service
D. Cross-site scripting

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question189

Employees in a company are no longer able to access Internet web sites on their computers. The network administrator is able to successfully ping IP address of web servers on the Internet and is able to open web sites by using an IP address in place of the URL. The administrator runs the nslookup command for www.eccouncil.org and receives an error message stating there is no response from the server. What should the administrator do next?


A.
Configure the firewall to allow traffic on TCP ports 53 and UDP port 53.
B. Configure the firewall to allow traffic on TCP ports 80 and UDP port 443.
C. Configure the firewall to allow traffic on TCP port 53.
D. Configure the firewall to allow traffic on TCP port 8080.

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question186

If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?


A.
Hping
B. Traceroute
C. TCP ping
D. Broadcast ping

Correct Answer: A

Certified Ethical Hacker – CEH – 312-50 – Question185

Which of the following items is unique to the N-tier architecture method of designing software applications?


A.
Application layers can be separated, allowing each layer to be upgraded independently from other layers.
B. It is compatible with various databases including Access, Oracle, and SQL.
C. Data security is tied into each layer and must be updated for all layers when any upgrade is performed.
D. Application layers can be written in C, ASP.NET, or Delphi without any performance loss.

Correct Answer: A