ECCouncil
312-50
240 Minutes
614
Certified Ethical Hacker v13
Select an option, then click Show Answer.
Your network infrastructure is under a SYN flood attack. The attacker has crafted an automated botnet to simultaneously send ‘s’ SYN packets per second to the server. You have put measures in place to manage ‘f SYN packets per second, and the system is designed to deal with this number without any performance issues. If ‘s’ exceeds ‘f’, the network infrastructure begins to show signs of overload. The system’s response time increases exponentially (24k), where ‘k’ represents each additional SYN packet above the ff limit. Now, considering ‘s=500’ and different ‘f values, in which scenario is the server most likely to experience overload and significantly increased response times?
Correct Answer: D
A well-resourced attacker intends to launch a highly disruptive DDoS attack against a major online retailer. The attacker aims to exhaust all the network resources while keeping their identity concealed. Their method should be resistant to simple defensive measures such as IP-based blocking. Based on these objectives, which of the following attack strategies would be most effective?
Correct Answer: A
You are an ethical hacker contracted to conduct a security audit for a company. During the audit, you discover that the company’s wireless network is using WEP encryption. You understand the vulnerabilities associated with WEP and plan to recommend a more secure encryption method. Which of the following would you recommend as a Suitable replacement to enhance the security of the company’s wireless network?
Correct Answer: B
An audacious attacker is targeting a web server you oversee. He intends to perform a Slow HTTP POST attack, by manipulating ‘a’ HTTP connection. Each connection sends a byte of data every ‘b’ second, effectively holding up the connections for an extended period. Your server is designed to manage ‘m’ connections per second, but any connections exceeding this number tend to overwhelm the system. Given ‘a=100’ and variable ‘m’, along with the attacker’s intention of maximizing the attack duration ‘D=a*b’, consider the following scenarios. Which is most likely to result in the longest duration of server unavailability?
Correct Answer: B
Have questions? You’re not alone. We’ve answered the most frequently asked questions to help you feel confident and informed every step of the way.
DumpMasters a premium service offering a comprehensive collection of exam questions and answers for over 1400 certification exams. It is regularly updated and designed to help users pass their certification exams confidently.
You can by Contacting our sales team.
Free updates are available for the duration of your subscription, after the subscription is expired, your access will no longer be available.