312-50 Dumps

312-50 Free Practice Test

EC-Council 312-50: Ethical Hacking and Countermeasures (CEHv6)

QUESTION 131

- (Topic 23)
You establish a new Web browser connection to Google. Since a 3-way handshake is required for any TCP connection, the following actions will take place.
312-50 dumps exhibit
✑ DNS query is sent to the DNS server to resolve www.google.com
✑ DNS server replies with the IP address for Google?
✑ SYN packet is sent to Google.
✑ Google sends back a SYN/ACK packet
✑ Your computer completes the handshake by sending an ACK
✑ The connection is established and the transfer of data commences
Which of the following packets represent completion of the 3-way handshake?

Correct Answer: D

QUESTION 132

- (Topic 3)
Which FTP transfer mode is required for FTP bounce attack?

Correct Answer: B
FTP bounce attack needs the server the support passive connections and the client program needs to use PORT command instead of the PASV command.

QUESTION 133

- (Topic 19)
While scanning a network you observe that all of the web servers in the DMZ are responding to ACK packets on port 80.
What can you infer from this observation?

Correct Answer: D
If they used a stateful inspection firewall this firewall would know if there has been a SYN-ACK before the ACK.

QUESTION 134

- (Topic 23)
Kevin is an IT security analyst working for Emerson Time Makers, a watch manufacturing company in Miami. Kevin and his girlfriend Katy recently broke up after a big fight. Kevin believes that she was seeing another person. Kevin, who has an online email account that he uses for most of his mail, knows that Katy has an account with that same company. Kevin logs into his email account online and gets the following URL after successfully logged in: http://www.youremailhere.com/mail.asp?mailbox=Kevin&Smith=121" Kevin changes the URL to: http://www.youremailhere.com/mail.asp?mailbox=Katy&Sanchez=121" Kevin is trying to access her email account to see if he can find out any information. What is Kevin attempting here to gain access to Katy's mailbox?

Correct Answer: C

QUESTION 135

- (Topic 4)
Which of the following tools can be used to perform a zone transfer?

Correct Answer: ACDE
There are a number of tools that can be used to perform a zone transfer. Some of these include: NSLookup, Host, Dig, and Sam Spade.