| Exam Code/Number: | 312-50v8Join the discussion |
| Exam Name: | Certified Ethical Hacker v8 |
| Certification: | EC-COUNCIL |
| Question Number: | 880 |
| Publish Date: | Dec 16, 2025 |
|
Rating
100%
|
|
How would you describe an attack where an attacker attempts to deliver the payload over multiple packets over long periods of time with the purpose of defeating simple pattern matching in IDS systems without session reconstruction? A characteristic of this attack would be a continuous stream of small packets.
Some passwords are stored using specialized encryption algorithms known as hashes. Why is this an appropriate method?
What are two things that are possible when scanning UDP ports? (Choose two.
You have the SOA presented below in your Zone. Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries?
collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)
Consider the following code:
URL:http://www.certified.com/search.pl?
text=<script>alert(document.cookie)</script>
If an attacker can trick a victim user to click a link like this, and the Web application does not validate input, then the victim's browser will pop up an alert showing the users current set of cookies. An attacker can do much more damage, including stealing passwords, resetting your home page, or redirecting the user to another Web site.
What is the countermeasure against XSS scripting?