Free EC0-350 Exam Braindumps (page: 15)

Page 14 of 191

Once an intruder has gained access to a remote system with a valid username and password, the attacker will attempt to increase his privileges by escalating the used account to one that has increased privileges. such as that of an administrator. What would be the best countermeasure to protect against escalation of priveges?

  1. Give users tokens
  2. Give user the least amount of privileges
  3. Give users two passwords
  4. Give users a strong policy document

Answer(s): B

Explanation:

With less privileges it is harder to increase the privileges.



What does the this symbol mean?

  1. Open Access Point
  2. WPA Encrypted Access Point
  3. WEP Encrypted Access Point
  4. Closed Access Point

Answer(s): A

Explanation:

This symbol is a “warchalking” symbol for a open node (open circle) with the SSID tsunami and the bandwidth 2.0 Mb/s



What is the expected result of the following exploit?

  1. Opens up a telnet listener that requires no username or password.
  2. Create a FTP server with write permissions enabled.
  3. Creates a share called “sasfile” on the target system.
  4. Creates an account with a user name of Anonymous and a password of noone@nowhere.com.

Answer(s): A

Explanation:

The script being depicted is in perl (both msadc.pl and the script their using as a wrapper) -- $port, $your, $user, $pass, $host are variables that hold the port # of a DNS server, an IP, username, and FTP password. $host is set to argument variable 0 (which means the string typed directly after the command). Essentially what happens is it connects to an FTP server and downloads nc.exe (the TCP/IP swiss-army knife -- netcat) and uses nc to open a TCP port spawning cmd.exe (cmd.exe is the Win32 DOS shell on NT/2000/2003/XP), cmd.exe when spawned requires NO username or password and has the permissions of the username it is being executed as (probably guest in this instance, although it could be administrator). The #'s in the script means the text following is a comment, notice the last line in particular, if the # was removed the script would spawn a connection to itself, the host system it was running on.



Bill is attempting a series of SQL queries in order to map out the tables within the database that he is trying to exploit.
Choose the attack type from the choices given below.

  1. Database Fingerprinting
  2. Database Enumeration
  3. SQL Fingerprinting
  4. SQL Enumeration

Answer(s): A

Explanation:

He is trying to create a view of the characteristics of the target database, he is taking it’s fingerprints.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts