Free EC0-350 Exam Braindumps (page: 25)

Page 24 of 191

A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) then it was intended to hold.
What is the most common cause of buffer overflow in software today?

  1. Bad permissions on files.
  2. High bandwidth and large number of users.
  3. Usage of non standard programming languages.
  4. Bad quality assurance on software produced.

Answer(s): D

Explanation:

Technically, a buffer overflow is a problem with the program's internal implementation.



Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?

  1. To determine who is the holder of the root account
  2. To perform a DoS
  3. To create needless SPAM
  4. To illicit a response back that will reveal information about email servers and how they treat undeliverable mail
  5. To test for virus protection

Answer(s): D

Explanation:

Sending a bogus email is one way to find out more about internal servers. Also, to gather additional IP addresses and learn how they treat mail.



Pandora is used to attack __________ network operating systems.

  1. Windows
  2. UNIX
  3. Linux
  4. Netware
  5. MAC OS

Answer(s): D

Explanation:

While there are not lots of tools available to attack Netware, Pandora is one that can be used.



In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob’s public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message.
Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob’s public key and use it to verify Bob’s signature, they cannot discover Bob’s private key and use it to forge digital signatures.
What does this principle refer to?

  1. Irreversibility
  2. Non-repudiation
  3. Symmetry
  4. Asymmetry

Answer(s): D

Explanation:

PKI uses asymmetric key pair encryption. One key of the pair is the only way to decrypt data encrypted with the other.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts