Free EC0-350 Exam Braindumps (page: 26)

Page 25 of 191

The Slammer Worm exploits a stack-based overflow that occurs in a DLL implementing the Resolution Service.
Which of the following Database Server was targeted by the slammer worm?

  1. Oracle
  2. MSSQL
  3. MySQL
  4. Sybase
  5. DB2

Answer(s): B

Explanation:

W32.Slammer is a memory resident worm that propagates via UDP Port 1434 and exploits a vulnerability in SQL Server 2000 systems and systems with MSDE 2000 that have not applied the patch released by Microsoft Security Bulletin MS02-039.



In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He concludes that since his access points require the client computer to have the proper SSID, it would prevent others from connecting to the wireless network. Unfortunately unauthorized users are still able to connect to the wireless network.
Why do you think this is possible?

  1. Bob forgot to turn off DHCP.
  2. All access points are shipped with a default SSID.
  3. The SSID is still sent inside both client and AP packets.
  4. Bob’s solution only works in ad-hoc mode.

Answer(s): B

Explanation:

All access points are shipped with a default SSID unique to that manufacturer, for example 3com uses the default ssid comcomcom.



Why would an ethical hacker use the technique of firewalking?

  1. It is a technique used to discover wireless network on foot.
  2. It is a technique used to map routers on a network link.
  3. It is a technique used to discover the nature of rules configured on a gateway.
  4. It is a technique used to discover interfaces in promiscuous mode.

Answer(s): C

Explanation:

Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway.



Samuel is high school teenager who lives in Modesto CaliforniA. Samuel is a straight ‘A’ student who really likes tinkering around with computers and other types of electronic devices. Samuel just received a new laptop for his birthday and has been configuring it ever since. While tweaking the registry, Samuel notices a pop up at the bottom of his screen stating that his computer was now connected to a wireless network. All of a sudden, he was able to get online and surf the Internet.
Samuel did some quick research and was able to gain access to the wireless router he was connecting to and see al of its settings? Being able to hop onto someone else’s wireless network so easily fascinated Samuel so he began doing more and more research on wireless technologies and how to exploit them. The next day Samuel’s fried said that he could drive around all over town and pick up hundred of wireless networks. This really excited Samuel so they got into his friend’s car and drove around the city seeing which networks they could connect to and which ones they could not.
What has Samuel and his friend just performed?

  1. Wardriving
  2. Warwalking
  3. Warchalking
  4. Webdriving

Answer(s): A

Explanation:

Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle using a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks. It was also known (as of 2002) as "WiLDing" (Wireless Lan Driving, although this term never gained any popularity and is no longer used), originating in the San Francisco Bay Area with the Bay Area Wireless Users Group (BAWUG). It is similar to using a scanner for radio.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts