Free EC0-350 Exam Braindumps (page: 31)

Page 30 of 191

Which type of attack is port scanning?

  1. Web server attack
  2. Information gathering
  3. Unauthorized access
  4. Denial of service attack

Answer(s): B



What is the name of the software tool used to crack a single account on Netware Servers using a dictionary attack?

  1. NPWCrack
  2. NWPCrack
  3. NovCrack
  4. CrackNov
  5. GetCrack

Answer(s): B

Explanation:

NWPCrack is the software tool used to crack single accounts on Netware servers.



What is SYSKEY # of bits used for encryption?

  1. 40
  2. 64
  3. 128
  4. 256

Answer(s): C

Explanation:

System Key hotfix is an optional feature which allows stronger encryption of SAM. Strong encryption protects private account information by encrypting the password data using a 128-bit cryptographically random key, known as a password encryption key.



Which of the following is one of the key features found in a worm but not seen in a virus?

  1. The payload is very small, usually below 800 bytes.
  2. It is self replicating without need for user intervention.
  3. It does not have the ability to propagate on its own.
  4. All of them cannot be detected by virus scanners.

Answer(s): B

Explanation:

A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts