Free EC0-350 Exam Braindumps (page: 20)

Page 19 of 191

Steven the hacker realizes that the network administrator of company is using syskey to protect organization resources in the Windows 2000 Server. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to brute force dictionary attacks on the hashes. Steven runs a program called “SysCracker” targeting the Windows 2000 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch attach.
How many bits does Syskey use for encryption?

  1. 40 bit
  2. 64 bit
  3. 256 bit
  4. 128 bit

Answer(s): D

Explanation:

SYSKEY is a utility that encrypts the hashed password information in a SAM database using a 128-bit encryption key.



Melissa is a virus that attacks Microsoft Windows platforms.
To which category does this virus belong?

  1. Polymorphic
  2. Boot Sector infector
  3. System
  4. Macro

Answer(s): D

Explanation:

The Melissa macro virus propagates in the form of an email message containing an infected Word document as an attachment.



In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless communications. Immediately after the implementation, users begin complaining about how slow the wireless network is. After benchmarking the network’s speed. Bob discovers that throughput has dropped by almost half even though the number of users has remained the same.
Why does this happen in the VPN over wireless implementation?

  1. The stronger encryption used by the VPN slows down the network.
  2. Using a VPN with wireless doubles the overhead on an access point for all direct client to access point communications.
  3. VPNs use larger packets then wireless networks normally do.
  4. Using a VPN on wireless automatically enables WEP, which causes additional overhead.

Answer(s): B

Explanation:

By applying VPN the access point will have to recalculate all headers destined for client and from clients twice.



Which one of the following attacks will pass through a network layer intrusion detection system undetected?

  1. A teardrop attack
  2. A SYN flood attack
  3. A DNS spoofing attack
  4. A test.cgi attack

Answer(s): D

Explanation:

Because a network-based IDS reviews packets and headers, it can also detect denial of service (DoS) attacks
Not A or B:
The following sections discuss some of the possible DoS attacks available.
Smurf
Fraggle
SYN Flood
Teardrop
DNS DoS Attacks”






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts