Free 312-50 Exam Dumps

Question 101

- (Topic 5)
Which of the following are well know password-cracking programs?(Choose all that apply.

Correct Answer:AE
L0phtcrack and John the Ripper are two well know password-cracking programs. Netcat is considered the Swiss-army knife of hacking tools, but is not used for password cracking

Question 102

- (Topic 4)
Eve is spending her day scanning the library computers. She notices that Alice is using a computer whose port 445 is active and listening. Eve uses the ENUM tool to enumerate Alice machine. From the command prompt, she types the following command.
For /f "tokens=1 %%a in (hackfile.txt) do net use * \10.1.2.3c$ /user:"Administrator"
%%a
What is Eve trying to do?

Correct Answer:C
Eve tries to get a successful login using the username Administrator and passwords from the file hackfile.txt.

Question 103

- (Topic 7)
How do you defend against ARP spoofing?

Correct Answer:ABC
ARPWALL is a opensource tools will give early warning when arp attack occurs. This tool is still under construction.

Question 104

- (Topic 7)
Samantha was hired to perform an internal security test of company. She quickly realized that all networks are making use of switches instead of traditional hubs. This greatly limits her ability to gather information through network sniffing.
Which of the following techniques can she use to gather information from the switched network or to disable some of the traffic isolation features of the switch? (Choose two)

Correct Answer:BD
In a typical MAC flooding attack, a switch is flooded with packets, each containing different source MAC addresses. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table.The result of this attack causes the switch to enter a state called failopen mode, in which all incoming packets are broadcast out on all ports (as with a hub), instead of just down the correct port as per normal operation. The principle of ARP spoofing is to send fake, or 'spoofed', ARP messages to an Ethernet LAN. These frames contain false MAC addresses, confusing network devices, such as network switches. As a result frames intended for one machine can be mistakenly sent to another (allowing the packets to be
sniffed) or an unreachable host (a denial of service attack).

Question 105

- (Topic 2)
Which of the following activities would not be considered passive footprinting?

Correct Answer:C
Passive footprinting is a method in which the attacker never makes contact with the target. Scanning the targets IP addresses can be logged at the target and therefore contact has been made.