312-50v12 Exam Questions

Total 569 Questions

Last Updated Exam : 15-Apr-2025

Topic 2: Exam Pool B

You have retrieved the raw hash values from a Windows 2000 Domain Controller. Using
social engineering, you come to know that they are enforcing strong passwords. You
understand that all users are required to use passwords that are at least 8 characters in
length. All passwords must also use 3 of the 4 following categories: lower case letters,
capital letters, numbers and special characters. With your existing knowledge of users,
likely user account names and the possibility that they will choose the easiest passwords
possible, what would be the fastest type of password cracking attack you can run against
these hash values and still get results?


A.

Online Attack


B.

Dictionary Attack


C.

Brute Force Attack


D.

Hybrid Attack





D.
  

Hybrid Attack



In Trojan terminology, what is a covert channel?

 


A.

A channel that transfers information within a computer system or network in a way that
violates the security policy


B.

A legitimate communication path within a computer system or network for transfer of
data


C.

It is a kernel operation that hides boot processes and services to mask detection


D.

It is a kernel operation that hides boot processes and services to mask detection





A.
  

A channel that transfers information within a computer system or network in a way that
violates the security policy



You receive an e-mail like the one shown below. When you click on the link contained in
the mail, you are redirected to a website seeking you to download free Anti-Virus software.
Dear valued customers,
We are pleased to announce the newest version of Antivirus 2010 for Windows which will
probe you with total security against the latest spyware, malware, viruses, Trojans and
other online threats. Simply visit the link below and enter your antivirus code:

or you may contact us at the following address:

Media Internet Consultants, Edif. Neptuno, Planta
Baja, Ave. Ricardo J. Alfaro, Tumba Muerto, n/a Panama
How will you determine if this is Real Anti-Virus or Fake Anti-Virus website?


A.

Look at the website design, if it looks professional then it is a Real Anti-Virus website


B.

Connect to the site using SSL, if you are successful then the website is genuine


C.

Search using the URL and Anti-Virus product name into Google and lookout for
suspicious warnings against this site


D.

Download and install Anti-Virus software from this suspicious looking site, your Windows
7 will prompt you and stop the installation if the downloaded file is a malware


E.

Download and install Anti-Virus software from this suspicious looking site, your Windows
7 will prompt you and stop the installation if the downloaded file is a malware





C.
  

Search using the URL and Anti-Virus product name into Google and lookout for
suspicious warnings against this site



What is the common name for a vulnerability disclosure program opened by companies In
platforms such as HackerOne?


A.

Vulnerability hunting program


B.

Bug bounty program


C.

White-hat hacking program


D.

Ethical hacking program





B.
  

Bug bounty program



Bug bounty programs allow independent security researchers to report bugs to an
companies and receive rewards or compensation. These bugs area unit sometimes
security exploits and vulnerabilities, although they will additionally embody method
problems, hardware flaws, and so on.
The reports area unit usually created through a program travel by associate degree
freelance third party (like Bugcrowd or HackerOne). The companies can got wind of (and
run) a program curated to the organization’s wants.
Programs is also non-public (invite-only) wherever reports area unit unbroken confidential
to the organization or public (where anyone will sign in and join). they will happen over a
collection timeframe or with without stopping date (though the second possibility is a lot of
common).
Who uses bug bounty programs?Many major organizations use bug bounties as an area of their security program, together with AOL, Android, Apple, Digital Ocean, and goldman
Sachs. you’ll read an inventory of all the programs offered by major bug bounty suppliers,
Bugcrowd and HackerOne, at these links.
Why do corporations use bug bounty programs?Bug bounty programs provide corporations
the flexibility to harness an outsized cluster of hackers so as to seek out bugs in their code.
This gives them access to a bigger variety of hackers or testers than they’d be able to
access on a one-on-one basis. It {can also|also will|can even|may also|may} increase the
probabilities that bugs area unit found and reported to them before malicious hackers can
exploit them.
It may also be an honest publicity alternative for a firm. As bug bounties became a lot of
common, having a bug bounty program will signal to the general public and even regulators
that a corporation incorporates a mature security program.
This trend is likely to continue, as some have began to see bug bounty programs as an
business normal that all companies ought to invest in.
Why do researchers and hackers participate in bug bounty programs?Finding and news
bugs via a bug bounty program may end up in each money bonuses and recognition. In
some cases, it will be a good thanks to show real-world expertise once you are looking for
employment, or will even facilitate introduce you to parents on the protection team within an
companies.
This can be full time income for a few of us, income to supplement employment, or the way
to point out off your skills and find a full time job.
It may also be fun! it is a nice (legal) probability to check out your skills against huge
companies and government agencies.
What area unit the disadvantages of a bug bounty program for independent researchers
and hackers?A lot of hackers participate in these varieties of programs, and it will be tough
to form a major quantity of cash on the platform.
In order to say the reward, the hacker has to be the primary person to submit the bug to the
program. meaning that in apply, you may pay weeks searching for a bug to use, solely to
be the person to report it and build no cash.
Roughly ninety seven of participants on major bug bounty platforms haven’t sold-out a bug.
In fact, a 2019 report from HackerOne confirmed that out of quite three hundred,000
registered users, solely around two.5% received a bounty in their time on the platform.
Essentially, most hackers are not creating a lot of cash on these platforms, and really few
square measure creating enough to switch a full time wage (plus they do not have
advantages like vacation days, insurance, and retirement planning).
What square measure the disadvantages of bug bounty programs for organizations?These
programs square measure solely helpful if the program ends up in the companies
realizeing issues that they weren’t able to find themselves (and if they’ll fix those problems)!
If the companies is not mature enough to be able to quickly rectify known problems, a bug
bounty program is not the right alternative for his or her companies.Also, any bug bounty program is probably going to draw in an outsized range of
submissions, several of which can not be high-quality submissions. a corporation must be
ready to cope with the exaggerated volume of alerts, and also the risk of a coffee signal to
noise magnitude relation (essentially that it’s probably that they’re going to receive quite
few unhelpful reports for each useful report).
Additionally, if the program does not attract enough participants (or participants with the
incorrect talent set, and so participants are not able to establish any bugs), the program is
not useful for the companies.
The overwhelming majority of bug bounty participants consider web site vulnerabilities
(72%, per HackerOn), whereas solely a number of (3.5%) value more highly to seek for
package vulnerabilities.
This is probably because of the actual fact that hacking in operation systems (like network
hardware and memory) needs a big quantity of extremely specialised experience. this
implies that firms may even see vital come on investment for bug bounties on websites,
and not for alternative applications, notably those that need specialised experience.
This conjointly implies that organizations which require to look at AN application or web site
among a selected time-frame may not need to rely on a bug bounty as there is no
guarantee of once or if they receive reports.
Finally, it are often probably risky to permit freelance researchers to try to penetrate your
network. this could end in public speech act of bugs, inflicting name harm within the
limelight (which could end in individuals not eager to purchase the organizations’ product or
service), or speech act of bugs to additional malicious third parties, United Nations agency
may use this data to focus on the organization.

How is the public key distributed in an orderly, controlled fashion so that the users can be
sure of the sender’s identity?


A.

Hash value


B.

Private key


C.

Digital signature


D.

Digital certificate





D.
  

Digital certificate



What is the algorithm used by LM for Windows2000 SAM?


A.

MD4


B.

DES


C.

SHA


D.

SSL





B.
  

DES



Daniel Is a professional hacker who Is attempting to perform an SQL injection attack on a
target website. www.movlescope.com. During this process, he encountered an IDS that
detects SQL Injection attempts based on predefined signatures. To evade any comparison
statement, he attempted placing characters such as ‘'or '1'='1" In any bask injection
statement such as "or 1=1." Identify the evasion technique used by Daniel in the above
scenario.


A.

Null byte


B.

IP fragmentation


C.

Char encoding


D.

Variation





D.
  

Variation



Explanation: One may append the comment “–” operator along with the String for the
username and whole avoid executing the password segment of the SQL query. Everything
when the — operator would be considered as comment and not dead.
To launch such an attack, the value passed for name could be ’OR ‘1’=‘1’ ; —Statement =
“SELECT * FROM ‘CustomerDB’ WHERE ‘name’ = ‘ ”+ userName + “ ‘ AND ‘password’ = ‘
” + passwd + “ ‘ ; ”
Statement = “SELECT * FROM ‘CustomerDB’ WHERE ‘name’ = ‘ ’ OR ‘1’=‘1‘;– + “ ‘ AND
‘password’ = ‘ ” + passwd + “ ‘ ; ”
All the records from the customer database would be listed.
Yet, another variation of the SQL Injection Attack can be conducted in dbms systems that
allow multiple SQL injection statements. Here, we will also create use of the vulnerability in sure dbms whereby a user provided field isn’t strongly used in or isn’t checked for sort
constraints.
This could take place once a numeric field is to be employed in a SQL statement; but, the
programmer makes no checks to validate that the user supplied input is numeric.
Variation is an evasion technique whereby the attacker can easily evade any comparison
statement. The attacker does this by placing characters such as “' or '1'='1'” in any basic
injection statement such as “or 1=1” or with other accepted SQL comments.
Evasion Technique: Variation Variation is an evasion technique whereby the attacker can
easily evade any comparison statement. The attacker does this by placing characters such
as “' or '1'='1'” in any basic injection statement such as “or 1=1” or with other accepted SQL
comments. The SQL interprets this as a comparison between two strings or characters
instead of two numeric values. As the evaluation of two strings yields a true statement,
similarly, the evaluation of two numeric values yields a true statement, thus rendering the
evaluation of the complete query unaffected. It is also possible to write many other
signatures; thus, there are infinite possibilities of variation as well. The main aim of the
attacker is to have a WHERE statement that is always evaluated as “true” so that any
mathematical or string comparison can be used, where the SQL can perform the same.

What kind of detection techniques is being used in antivirus softwares that identifies
malware by collecting data from multiple protected systems and instead of analyzing files
locally it's made on the premiers environment-


A.

VCloud based


B.

Honypot based


C.

Behaviour based


D.

Heuristics based





A.
  

VCloud based



Which of the following LM hashes represent a password of less than 8 characters?
(Choose two.)


A.

BA810DBA98995F1817306D272A9441BB


B.

44EFCE164AB921CQAAD3B435B51404EE


C.

0182BD0BD4444BF836077A718CCDF409


D.

CEC52EB9C8E3455DC2265B23734E0DAC


E.

B757BF5C0D87772FAAD3B435B51404EE


F.

E52CAC67419A9A224A3B108F3FA6CB6D





B.
  

44EFCE164AB921CQAAD3B435B51404EE



E.
  

B757BF5C0D87772FAAD3B435B51404EE



In the field of cryptanalysis, what is meant by a “rubber-hose" attack?


A.

Attempting to decrypt cipher text by making logical assumptions about the contents of
the original plain text.


B.

Extraction of cryptographic secrets through coercion or torture


C.

Forcing the targeted key stream through a hardware-accelerated device such as an
ASIC.


D.

A backdoor placed into a cryptographic algorithm by its creator.





B.
  

Extraction of cryptographic secrets through coercion or torture




Page 20 out of 57 Pages
Previous