ECCouncil 312-50 - Certified Ethical Hacker Exam
Which of the following network attacks takes advantage of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?
While testing the company's web applications, a tester attempts to insert the following test script into the search area on the company's web site:
Afterwards, when the tester presses the search button, a pop-up box appears on the screen with the text: "Testing Testing Testing". Which vulnerability has been detected in the web application?
When setting up a wireless network, an administrator enters a pre-shared key for security. Which of the following is true?
An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?
Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
An attacker sniffs encrypted traffic from the network and is subsequently able to decrypt it. The attacker can now use which cryptanalytic technique to attempt to discover the encryption key?
Which of the following is a preventive control?
Which security control role does encryption meet?
Which of the following is a detective control?
What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the received response?