Free 312-50 Exam Braindumps (page: 58)

Page 57 of 191

You have successfully brute forced basic authentication configured on a Web Server using Brutus hacking tool. The username/password is “Admin” and “Bettlemani@”. You logon to the system using the brute forced password and plant backdoors and rootkits.
After downloading various sensitive documents from the compromised machine, you proceed to clear the log files to hide your trace..
Which event log located at C:\Windows\system32\config contains the trace of your brute force attempts?

  1. AppEvent.Evt
  2. SecEvent.Evt
  3. SysEvent.Evt
  4. WinEvent.Evt

Answer(s): B

Explanation:

The Security Event log (SecEvent.Evt) will contain all the failed logins against the system.



Assuring two systems that are using IPSec to protect traffic over the internet, what type of general attack could compromise the data?

  1. Spoof Attack
  2. Smurf Attack
  3. Man in the Middle Attack
  4. Trojan Horse Attack
  5. Back Orifice Attack

Answer(s): D,E

Explanation:

To compromise the data, the attack would need to be executed before the encryption takes place at either end of the tunnel. Trojan Horse and Back Orifice attacks both allow for potential data manipulation on host computers. In both cases, the data would be compromised either before encryption or after decryption, so IPsec is not preventing the attack.



What is a Trojan Horse?

  1. A malicious program that captures your username and password
  2. Malicious code masquerading as or replacing legitimate code
  3. An unauthorized user who gains access to your user database and adds themselves as a user
  4. A server that is to be sacrificed to all hacking attempts in order to log and monitor the hacking activity

Answer(s): B

Explanation:

A Trojan Horse is an apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data.



You want to use netcat to generate huge amount of useless network data continuously for various performance testing between 2 hosts.
Which of the following commands accomplish this?

  1. Machine A
    #yes AAAAAAAAAAAAAAAAAAAAAA | nc –v –v –l –p 2222 > /dev/null
    Machine B
    #yes BBBBBBBBBBBBBBBBBBBBBB | nc machinea 2222 > /dev/null
  2. Machine A
    cat somefile | nc –v –v –l –p 2222
    Machine B
    cat somefile | nc othermachine 2222
  3. Machine A
    nc –l –p 1234 | uncompress –c | tar xvfp
    Machine B
    tar cfp - /some/dir | compress –c | nc –w 3 machinea 1234
  4. Machine A while true : do
    nc –v –l –s –p 6000 machineb 2
    Machine B
    while true ; do
    nc –v –l –s –p 6000 machinea 2 done

Answer(s): A

Explanation:

Machine A is setting up a listener on port 2222 using the nc command and then having the letter A sent an infinite amount of times, when yes is used to send data yes NEVER stops until it recieves a break signal from the terminal (Control+C), on the client end (machine B), nc is being used as a client to connect to machine A, sending the letter B and infinite amount of times, while both clients have established a TCP connection each client is infinitely sending data to each other, this process will run FOREVER until it has been stopped by an administrator or the attacker.






Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

312-50 Exam Discussions & Posts