Free 312-50 Exam Braindumps (page: 23)

Page 22 of 191

You are concerned that someone running PortSentry could block your scans, and you decide to slow your scans so that no one detects them. Which of the following commands will help you achieve this?

  1. nmap -sS -PT -PI -O -T1 <ip address>
  2. nmap -sO -PT -O -C5 <ip address>
  3. nmap -sF -PT -PI -O <ip address>
  4. nmap -sF -P0 -O <ip address>

Answer(s): A

Explanation:

-T[0-5]: Set timing template (higher is faster)



You are performing a port scan with nmap. You are in hurry and conducting the scans at the fastest possible speed. However, you don't want to sacrifice reliability for speed. If stealth is not an issue, what type of scan should you run to get very reliable results?

  1. XMAS scan
  2. Stealth scan
  3. Connect scan
  4. Fragmented packet scan

Answer(s): C

Explanation:

A TCP Connect scan, named after the Unix connect() system call is the most accurate scanning method. If a port is open the operating system completes the TCP three-way handshake, and the port scanner immediately closes the connection.



Neil notices that a single address is generating traffic from its port 500 to port 500 of several other machines on the network. This scan is eating up most of the network bandwidth and Neil is concerned. As a security professional, what would you infer from this scan?

  1. It is a network fault and the originating machine is in a network loop
  2. It is a worm that is malfunctioning or hardcoded to scan on port 500
  3. The attacker is trying to detect machines on the network which have SSL enabled
  4. The attacker is trying to determine the type of VPN implementation and checking for IPSec

Answer(s): D

Explanation:

Port 500 is used by IKE (Internet Key Exchange). This is typically used for IPSECbased VPN software, such as Freeswan, PGPnet, and various vendors of in-a-box VPN solutions such as Cisco. IKE is used to set up the session keys. The actual session is usually sent with ESP (Encapsulated Security Payload) packets, IP protocol 50 (but some in-a-box VPN's such as Cisco are capable of negotiating to send the encrypted tunnel over a UDP channel, which is useful for use across firewalls that block IP protocols other than TCP or UDP).



A distributed port scan operates by:

  1. Blocking access to the scanning clients by the targeted host
  2. Using denial-of-service software against a range of TCP ports
  3. Blocking access to the targeted host by each of the distributed scanning clients
  4. Having multiple computers each scan a small number of ports, then correlating the results

Answer(s): D

Explanation:

Think of dDoS (distributed Denial of Service) where you use a large number of computers to create simultaneous traffic against a victim in order to shut them down.






Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

312-50 Discussions & Posts