Free 312-50 Exam Braindumps (page: 40)

Page 39 of 191

Which definition among those given below best describes a covert channel?

  1. A server program using a port that is not well known.
  2. Making use of a protocol in a way it is not intended to be used.
  3. It is the multiplexing taking place on a communication link.
  4. It is one of the weak channels used by WEP which makes it insecure.

Answer(s): B

Explanation:

A covert channel is described as: "any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy." Essentially, it is a method of communication that is not part of an actual computer system design, but can be used to transfer information to users or system processes that normally would not be allowed access to the information.



Susan has attached to her company’s network. She has managed to synchronize her boss’s sessions with that of the file server. She then intercepted his traffic destined for the server, changed it the way she wanted to and then placed it on the server in his home directory. What kind of attack is Susan carrying on?

  1. A sniffing attack
  2. A spoofing attack
  3. A man in the middle attack
  4. A denial of service attack

Answer(s): C

Explanation:

A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised.



Eric has discovered a fantastic package of tools named Dsniff on the Internet. He has learnt to use these tools in his lab and is now ready for real world exploitation. He was able to effectively intercept communications between the two entities and establish credentials with both sides of the connections. The two remote ends of the communication never notice that Eric is relaying the information between the two.
What would you call this attack?

  1. Interceptor
  2. Man-in-the-middle
  3. ARP Proxy
  4. Poisoning Attack

Answer(s): B

Explanation:

A man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised.



Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \\10.1.2.3\c$ /user:"Administrator" %%a What is Eve trying to do?

  1. Eve is trying to connect as an user with Administrator privileges
  2. Eve is trying to enumerate all users with Administrative privileges
  3. Eve is trying to carry out a password crack for user Administrator
  4. Eve is trying to escalate privilege of the null user to that of Administrator

Answer(s): C

Explanation:

Eve tries to get a successful login using the username Administrator and passwords from the file hackfile.txt.






Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

312-50 Discussions & Posts