Certified Ethical Hacker – CEH – 312-50 – Question114

A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. Which is the most efficient technique should the tester consider using?


A.
Spoofing an IP address
B. Tunneling scan over SSH
C. Tunneling over high port numbers
D. Scanning using fragmented IP packets

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question111

Which NMAP command combination would let a tester scan every TCP port from a class C network that is blocking ICMP with fingerprinting and service detection?


A.
NMAP -PN -A -O -sS 192.168.2.0/24
B. NMAP -P0 -A -O -p1-65535 192.168.0/24
C. NMAP -P0 -A -sT -p0-65535 192.168.0/16
D. NMAP -PN -O -sS -p 1-1024 192.168.0/8

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question110

Which of the statements concerning proxy firewalls is correct?


A.
Proxy firewalls increase the speed and functionality of a network.
B. Firewall proxy servers decentralize all activity for an application.
C. Proxy firewalls block network packets from passing to and from a protected network.
D. Computers establish a connection with a proxy firewall which initiates a new network connection for the client.

Correct Answer: D

Certified Ethical Hacker – CEH – 312-50 – Question108

A tester has been using the msadc.pl attack script to execute arbitrary commands on a Windows NT4 web server. While it is effective, the tester finds it tedious to perform extended functions. On further research, the tester come across a perl script that runs the following msadc functions:

Which exploit is indicated by this script?


A.
A buffer overflow exploit
B. A chained exploit
C. A SQL injection exploit
D. A denial of service exploit

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question107

A recently hired network security associate at a local bank was given the responsibility to perform daily scans of the internal network to look for unauthorized devices. The employee decides to write a script that will scan the network for unauthorized devices every morning at 5:00 am.

Which of the following programming languages would most likely be used?


A.
PHP
B. C#
C. Python
D. ASP.NET

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question106

An engineer is learning to write exploits in C++ and is using the exploit tool Backtrack. The engineer wants to compile the newest C++ exploit and name it calc.exe. Which command would the engineer use to accomplish this?


A.
g++ hackersExploit.cpp -o calc.exe
B. g++ hackersExploit.py -o calc.exe
C. g++ -i hackersExploit.pl -o calc.exe
D. g++ –compile i hackersExploit.cpp -o calc.exe

Correct Answer: A