Free EC0-350 Exam Braindumps (page: 2)

Page 1 of 191

What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?

  1. The ethical hacker does not use the same techniques or skills as a cracker.
  2. The ethical hacker does it strictly for financial motives unlike a cracker.
  3. The ethical hacker has authorization from the owner of the target.
  4. The ethical hacker is just a cracker who is getting paid.

Answer(s): C

Explanation:

The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target.



Study the following exploit code taken from a Linux machine and answer the questions below:
echo “ingreslock stream tcp nowait root /bin/sh sh –I" > /tmp/x;
/usr/sbin/inetd –s /tmp/x;
sleep 10;
/bin/ rm –f /tmp/x AAAA…AAA
In the above exploit code, the command “/bin/sh sh –I" is given.
What is the purpose, and why is ‘sh’ shown twice?

  1. The command /bin/sh sh –i appearing in the exploit code is actually part of an inetd configuration file.
  2. The length of such a buffer overflow exploit makes it prohibitive for user to enter manually.
    The second ‘sh’ automates this function.
  3. It checks for the presence of a codeword (setting the environment variable) among the environment variables.
  4. It is a giveaway by the attacker that he is a script kiddy.

Answer(s): A

Explanation:

What's going on in the above question is the attacker is trying to write to the unix filed /tm/x (his inetd.conf replacement config) -- he is attempting to add a service called ingresslock (which doesnt exist), which is "apparently" suppose to spawn a shell the given port specified by /etc/services for the service "ingresslock", ingresslock is a non-existant service, and if an attempt were made to respawn inetd, the service would error out on that line. (he would have to add the service to /etc/services to suppress the error). Now the question is asking about /bin/sh sh -i which produces an error that should read "sh: /bin/sh: cannot execute binary file", the -i option places the shell in interactive mode and cannot be used to respawn itself.



Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some information about the target they are attempting to penetrate.
What would you call this kind of activity?

  1. CI Gathering
  2. Scanning
  3. Dumpster Diving
  4. Garbage Scooping

Answer(s): C



One of the better features of NetWare is the use of packet signature that includes cryptographic signatures. The packet signature mechanism has four levels from 0 to 3.
In the list below which of the choices represent the level that forces NetWare to sign all packets?

  1. 0 (zero)
  2. 1
  3. 2
  4. 3

Answer(s): D

Explanation:

0 Server does not sign packets (regardless of the client level).
1 Server signs packets if the client is capable of signing (client level is 2 or higher).
2 Server signs packets if the client is capable of signing (client level is 1 or higher).
3 Server signs packets and requires all clients to sign packets or logging in will fail.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts