Latest ECCouncil 312-50v8 Real Exam Download 551-560

What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?
A. Blind Port Scanning
B. Idle Scanning
C. Bounce Scanning
D. Stealth Scanning
E. UDP Scanning
From NMAP:
-sI Idlescan: This advanced scan method allows for a truly blind TCP
port scan of the target (meaning no packets are sent to the tar- get from your real IP address).
Instead,a unique side-channel attack exploits predictable “IP fragmentation ID” sequence
generation on the zombie hostto glean information about the open ports on the target.
What port scanning method is the most reliable but also the most detectable?
A. Null Scanning
B. Connect Scanning
C. ICMP Scanning
D. Idlescan Scanning
E. Half Scanning
F. Verbose Scanning
A TCP Connect scan,named after the Unix connect() system call is the most accurate scanning method. If a port is open the operating system completes the TCP three-way handshake,and the port scanner immediately closes the connection.
What does an ICMP (Code 13) message normally indicates?
A. It indicates that the destination host is unreachable
B. It indicates to the host that the datagram which triggered the source quench message will need to be re-sent
C. It indicates that the packet has been administratively dropped in transit
D. It is a request to the host to cut back the rate at which it is sending traffic to the Internet destination
CODE 13 and type 3 is destination unreachable due to communication administratively prohibited by filtering hence maybe they meant “code 13”,therefore would be C).
Note: A – Type 3 B – Type 4 C – Type 3 Code 13 D – Typ4 4
Because UDP is a connectionless protocol: (Select 2)
A. UDP recvfrom() and write() scanning will yield reliable results
B. It can only be used for Connect scans
C. It can only be used for SYN scans
D. There is no guarantee that the UDP packets will arrive at their destination
E. ICMP port unreachable messages may not be returned successfully
Answer: D,E 
Neither UDP packets,nor the ICMP errors are guaranteed to arrive,so UDP scanners must also implement retransmission of packets that appear to be lost (or you will get a bunch of false positives).
What ICMP message types are used by the ping command?
A. Timestamp request (13) and timestamp reply (14)
B. Echo request (8) and Echo reply (0)
C. Echo request (0) and Echo reply (1)
D. Ping request (1) and Ping reply (2)
ICMP Type 0 = Echo Reply,ICMP Type 8 = Echo
Which of the following systems would not respond correctly to an nmap XMAS scan?
A. Windows 2000 Server running IIS 5
B. Any Solaris version running SAMBA Server
C. Any version of IRIX
D. RedHat Linux 8.0 running Apache Web Server
When running a XMAS Scan,if a RST packet is received,the port is considered closed,while no response means it is open|filtered. The big downside is that not all systems follow RFC 793 to the letter. A number of systems send RST responses to the probes regardless of whether the port is open or not. This causes all of the ports to be labeled closed. Major operating systems that do this are Microsoft Windows,many Cisco devices,BSDI,and IBM OS/400.
Use the traceroute results shown above to answer the following question:
 The perimeter security at does not permit ICMP TTL-expired packets out.
A. True
B. False
As seen in the exhibit there is 2 registrations with timeout,this tells us that the firewall filters packets where the TTL has reached 0,when you continue with higher starting values for TTL you will get an answer from the target of the traceroute.
While attempting to discover the remote operating system on the target computer, you receive the following results from an nmap scan:
Remote operating system guess: Too many signatures match to reliably guess the OS.
Nmap run completed — 1 IP address (1 host up) scanned in 277.483 seconds
What should be your next step to identify the OS?
A. Perform a firewalk with that system as the target IP
B. Perform a tcp traceroute to the system using port 53
C. Run an nmap scan with the -v-v option to give a better output
D. Connect to the active services and review the banner information
Most people donot care about changing the banners presented by applications listening to open ports and therefore you should get fairly accurate information when grabbing banners from open ports with,for example,a telnet application.
When Nmap performs a ping sweep, which of the following sets of requests does it send to the target device?
The default behavior of NMAP is to do both an ICMP ping sweep (the usual kind of ping) and a TCP port 80 ACK ping sweep. If an admin is logging these this will be fairly characteristic of NMAP.
_________ is one of the programs used to wardial.
A. DialIT
B. Netstumbler
C. TooPac
D. Kismet
E. ToneLoc
ToneLoc is one of the programs used to wardial. While this is considered an “old school” technique,it is still effective at finding backdoors and out of band network entry points.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s