Free 312-50 Exam Braindumps (page: 62)

Page 61 of 191

Which definition below best describes a covert channel?

  1. Making use of a Protocol in a way it was not intended to be used
  2. It is the multiplexing taking place on communication link
  3. It is one of the weak channels used by WEP that makes it insecure
  4. A Server Program using a port that is not well known

Answer(s): A

Explanation:

A covert channel is a hidden communication channel not intended for information transfer at all. Redundancy can often be used to communicate in a covert way. There are several ways that hidden communication can be set up.



Spears Technology, Inc is a software development company located in Los Angeles, CaliforniA. They reported a breach in security, stating that its “security defenses has been breached and exploited for 2 weeks by hackers. “The hackers had accessed and downloaded 90, 000 address containing customer credit cards and password. Spears Technology found this attack to be so to law enforcement officials to protect their intellectual property.

How did this attack occur? The intruder entered through an employees home machine, which was connected to Spears Technology, Inc’s corporate VPN network. The application called BEAST Trojan was used in the attack to open a “Back Door” allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge.

The hackers were traced back to Beijing China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Spears Technology’s network from a remote location, posing as employees. The intent of the attacker was to steal the source code for their VOIP system and “hold it hostage” from Spears Technology, Inc exchange for ransom.

The hackers had intended on selling the stolen VOIP software source code to competitors. How would you prevent such attacks from occurring in the future at Spears Technology?

  1. Disable VPN access to all your employees from home machines
  2. Allow VPN access but replace the standard authentication with biometric authentication
  3. Replace the VPN access with dial-up modem access to the company’s network
  4. Enable 25 character complex password policy for employees to access the VPN network.

Answer(s): A

Explanation:

As long as there is a way in for employees through all security measures you can’t be secure because you never know what computer the employees use to access recourses at their workplace.



William has received a Tetris game from someone in his computer programming class through email. William does not really know the person who sent the game very well, but decides to install the game anyway because he really likes Tetris.
After William installs the game, he plays it for a couple of hours. The next day, William plays the Tetris game again and notices that his machines have begun to slow down. He brings up his Task Manager and sees the following programs running (see Screenshot):

What has William just installed?

  1. Remote Access Trojan (RAT)
  2. Zombie Zapper (ZoZ)
  3. Bot IRC Tunnel (BIT)
  4. Root Digger (RD)

Answer(s): A

Explanation:

RATs are malicious programs that run invisibly on host PCs and permit an intruder remote access and control. On a basic level, many RATs mimic the functionality of legitimate remote control programs such as Symantec's pcAnywhere but are designed specifically for stealth installation and operation. Intruders usually hide these Trojan horses in games and other small programs that unsuspecting users then execute on their PCs. Typically, exploited users either download and execute the malicious programs or are tricked into clicking rogue email attachments.



John wants to try a new hacking tool on his Linux System. As the application comes from a site in his untrusted zone, John wants to ensure that the downloaded tool has not been Trojaned. Which of the following options would indicate the best course of action for John?

  1. Obtain the application via SSL
  2. Obtain the application from a CD-ROM disc
  3. Compare the files’ MD5 signature with the one published on the distribution media
  4. Compare the file’s virus signature with the one published on the distribution media

Answer(s): C

Explanation:

In essence, MD5 is a way to verify data integrity, and is much more reliable than checksum and many other commonly used methods.






Post your Comments and Discuss EC-Council 312-50 exam with other Community members:

312-50 Exam Discussions & Posts