312-50 Dumps

312-50 Free Practice Test

EC-Council 312-50: Ethical Hacking and Countermeasures (CEHv6)

QUESTION 56

- (Topic 23)
How do you defend against ARP Poisoning attack? (Select 2 answers)
312-50 dumps exhibit

Correct Answer: AC

QUESTION 57

- (Topic 7)
Ethernet switches can be adversely affected by rapidly bombarding them with spoofed ARP responses. He port to MAC Address table (CAM Table) overflows on the switch and rather than failing completely, moves into broadcast mode, then the hacker can sniff all of the packets on the network.
Which of the following tool achieves this?

Correct Answer: A
macof floods the local network with random MAC addresses (causing some switches to fail open in repeating mode, facilitating sniffing).

QUESTION 58

- (Topic 23)
What type of session hijacking attack is shown in the exhibit?
312-50 dumps exhibit

Correct Answer: D

QUESTION 59

- (Topic 23)
You are gathering competitive intelligence on an organization. You notice that they have jobs listed on a few Internet job-hunting sites. There are two jobs for network and system administrators. How can this help you in foot printing the organization?

Correct Answer: D

QUESTION 60

- (Topic 23)
This is an authentication method in which is used to prove that a party knows a password without transmitting the password in any recoverable form over a network. This authentication is secure because the password is never transmitted over the network, even in hashed form; only a random number and an encrypted random number are sent.

Correct Answer: E
Challenge-Response Authentication The secure Challenge-Response Authentication Mechanism (CRAM-MD5) avoids passing a cleartext password
over the network when you access your email account, ensuring that your login details cannot be captured and used by anyone in transit. http://www.neomailbox.com/component/content/article/212-hardware-token-authentication