Free EC0-350 Exam Braindumps (page: 30)

Page 29 of 191

After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?

  1. Install pactehs
  2. Setup a backdoor
  3. Cover your tracks
  4. Install a zombie for DDOS

Answer(s): C

Explanation:

As a hacker you don’t want to leave any traces that could lead back to you.



Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

  1. Teardrop
  2. Smurf
  3. Ping of Death
  4. SYN flood
  5. SNMP Attack

Answer(s): A

Explanation:

The teardrop attack uses overlapping packet fragments to confuse a target system and cause the system to reboot or crash.



Ethereal works best on ____________.

  1. Switched networks
  2. Linux platforms
  3. Networks using hubs
  4. Windows platforms
  5. LAN's

Answer(s): C

Explanation:

Ethereal is used for sniffing traffic. It will return the best results when used on an unswitched (i.e. hub. network.



While investigating a claim of a user downloading illegal material, the investigator goes through the files on the suspect’s workstation. He comes across a file that is called ‘file.txt’ but when he opens it, he find the following:

What does this file contain?

  1. A picture that has been renamed with a .txt extension.
  2. An encrypted file.
  3. A uuencoded file.
  4. A buffer overflow.

Answer(s): D

Explanation:

This is a buffer overflow exploit with its “payload” in hexadecimal format.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts