Free EC0-350 Exam Braindumps (page: 22)

Page 21 of 191

Which of the following algorithms can be used to guarantee the integrity of messages being sent, in transit, or stored? (Choose the best answer)

  1. symmetric algorithms
  2. asymmetric algorithms
  3. hashing algorithms
  4. integrity algorithms

Answer(s): C

Explanation:

In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or 'message') of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint.



The following excerpt is taken from a honeyput log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. Study the log given below and answer the following question:
(Note: The objective of this questions is to test whether the student has learnt about passive OS fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection attack signature; can they infer if a user ID has been created by an attacker and whether they can read plain source – destination entries from log entries.)

What can you infer from the above log?

  1. The system is a windows system which is being scanned unsuccessfully.
  2. The system is a web application server compromised through SQL injection.
  3. The system has been compromised and backdoored by the attacker.
  4. The actual IP of the successful attacker is 24.9.255.53.

Answer(s): A



What is "Hacktivism"?

  1. Hacking for a cause
  2. Hacking ruthlessly
  3. An association which groups activists
  4. None of the above

Answer(s): A

Explanation:

The term was coined by author/critic Jason Logan King Sack in an article about media artist Shu Lea Cheang. Acts of hacktivism are carried out in the belief that proper use of code will have leveraged effects similar to regular activism or civil disobedience.



Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic?

  1. Network aliasing
  2. Domain Name Server (DNS) poisoning
  3. Reverse Address Resolution Protocol (ARP)
  4. Port scanning

Answer(s): B

Explanation:

This reference is close to the one listed DNS poisoning is the correct answer.
This is how DNS DOS attack can occur. If the actual DNS records are unattainable to the attacker for him to alter in this fashion, which they should be, the attacker can insert this data into the cache of there server instead of replacing the actual records, which is referred to as cache poisoning.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts