Free EC0-350 Exam Braindumps (page: 13)

Page 12 of 191

Which one of the following instigates a SYN flood attack?

  1. Generating excessive broadcast packets.
  2. Creating a high number of half-open connections.
  3. Inserting repetitive Internet Relay Chat (IRC) messages.
  4. A large number of Internet Control Message Protocol (ICMP) traces.

Answer(s): B

Explanation:

A SYN attack occurs when an attacker exploits the use of the buffer space during a Transmission Control Protocol (TCP) session initialization handshake. The attacker floods the target system's small "in-process" queue with connection requests, but it does not respond when a target system replies to those requests. This causes the target system to time out while waiting for the proper response, which makes the system crash or become unusable.



A remote user tries to login to a secure network using Telnet, but accidently types in an invalid user name or password. Which responses would NOT be preferred by an experienced Security Manager? (multiple answer)

  1. Invalid Username
  2. Invalid Password
  3. Authentication Failure
  4. Login Attempt Failed
  5. Access Denied

Answer(s): A,B

Explanation:

As little information as possible should be given about a failed login attempt. Invalid username or password is not desirable.



The programmers on your team are analyzing the free, open source software being used to run FTP services on a server. They notice that there is an excessive number of fgets() and gets() on the source code. These C++ functions do not check bounds.
What kind of attack is this program susceptible to?

  1. Buffer of Overflow
  2. Denial of Service
  3. Shatter Attack
  4. Password Attack

Answer(s): A

Explanation:

C users must avoid using dangerous functions that do not check bounds unless they've ensured that the bounds will never get exceeded. A buffer overflow occurs when you write a set of values (usually a string of characters) into a fixed length buffer and write at least one value outside that buffer's boundaries (usually past its end). A buffer overflow can occur when reading input from the user into a buffer, but it can also occur during other kinds of processing in a program.



In which of the following should be performed first in any penetration test?

  1. System identification
  2. Intrusion Detection System testing
  3. Passive information gathering
  4. Firewall testing

Answer(s): C






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts