Free 312-50 Exam Braindumps (page: 29)

Page 28 of 191

Which FTP transfer mode is required for FTP bounce attack?

  1. Active Mode
  2. Passive Mode
  3. User Mode
  4. Anonymous Mode

Answer(s): B

Explanation:

FTP bounce attack needs the server the support passive connections and the client program needs to use PORT command instead of the PASV command.



Nathalie would like to perform a reliable scan against a remote target. She is not concerned about being stealth at this point. Which of the following type of scans would be the most accurate and reliable?

  1. A FIN Scan
  2. A Half Scan
  3. A UDP Scan
  4. The TCP Connect Scan

Answer(s): D

Explanation:

The connect() system call provided by your operating system is used to open a connection to every interesting port on the machine. If the port is listening, connect() will succeed, otherwise the port isn't reachable. One strong advantage to this technique is that you don't need any special privileges. This is the fastest scanning method supported by nmap, and is available with the -t (TCP) option. The big downside is that this sort of scan is easily detectable and filterable.



John has performed a scan of the web server with NMAP but did not gather enough information to accurately identify which operating system is running on the remote host. How could you use a web server to help in identifying the OS that is being used?

  1. Telnet to an Open port and grab the banner
  2. Connect to the web server with an FTP client
  3. Connect to the web server with a browser and look at the web page
  4. Telnet to port 8080 on the web server and look at the default page code

Answer(s): A

Explanation:

Most Web servers politely identify themselves and the OS to anyone who asks.



Mark works as a contractor for the Department of Defense and is in charge of network security. He has spent the last month securing access to his network from all possible entry points. He has segmented his network into several subnets and has installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used. He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Mark is fairly confident of his perimeter defense, but is still worried about programs like Hping2 that can get into a network through convert channels.
How should mark protect his network from an attacker using Hping2 to scan his internal network?

  1. Blocking ICMP type 13 messages
  2. Block All Incoming traffic on port 53
  3. Block All outgoing traffic on port 53
  4. Use stateful inspection on the firewalls

Answer(s): A

Explanation:

An ICMP type 13 message is an ICMP timestamp request and waits for an ICMP timestamp reply. The remote node is right to do, still it would not be necessary as it is optional and thus many ip stacks ignore such packets. Nevertheless, nmap again achived to make its packets unique by setting the originating timestamp field in the packet to 0.






Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

312-50 Discussions & Posts