Free EC0-350 Exam Braindumps (page: 39)

Page 38 of 191

The United Kingdom (UK) he passed a law that makes hacking into an unauthorized network a felony.
The law states:

Section1 of the Act refers to unauthorized access to computer material. This states that a person commits an offence if he causes a computer to perform any function with intent to secure unauthorized access to any program or data held in any computer. For a successful conviction under this part of the Act, the prosecution must prove that the access secured is unauthorized and that the suspect knew that this was the case. This section is designed to deal with common-or-graden hacking.
Section 2 of the deals with unauthorized access with intent to commit or facilitate the commission of further offences. An offence is committed under Section 2 if a Section 1 offence has been committed and there is the intention of committing or facilitating a further offense (any offence which attacks a custodial sentence of more than five years, not necessarily one covered but the Act). Even if it is not possible to prove the intent to commit the further offence, the Section 1 offence is still committed.
Section 3 Offences cover unauthorized modification of computer material, which generally means the creation and distribution of viruses. For conviction to succeed there must have been the intent to cause the modifications and knowledge that the modification had not been authorized
What is the law called?

  1. Computer Misuse Act 1990
  2. Computer incident Act 2000
  3. Cyber Crime Law Act 2003
  4. Cyber Space Crime Act 1995

Answer(s): A

Explanation:

Computer Misuse Act (1990) creates three criminal offences:
1. Unauthorised access to computer material
2. Unauthorised access to a computer system with intent to commit or facilitate the commission of a further offence
3. Unauthorised modification of computer material



To what does “message repudiation” refer to what concept in the realm of email security?

  1. Message repudiation means a user can validate which mail server or servers a message was passed through.
  2. Message repudiation means a user can claim damages for a mail message that damaged their reputation.
  3. Message repudiation means a recipient can be sure that a message was sent from a particular person.
  4. Message repudiation means a recipient can be sure that a message was sent from a certain host.
  5. Message repudiation means a sender can claim they did not actually send a particular message.

Answer(s): E

Explanation:

A quality that prevents a third party from being able to prove that a communication between two other parties ever took place. This is a desirable quality if you do not want your communications to be traceable.
Non-repudiation is the opposite quality—a third party can prove that a communication between two other parties took place. Non-repudiation is desirable if you want to be able to trace your communications and prove that they occurred. Repudiation – Denial of message submission or delivery.



You want to carry out session hijacking on a remote server. The server and the client are communicating via TCP after a successful TCP three way handshake. The server has just received packet #120 from the client. The client has a receive window of 200 and the server has a receive window of 250.
Within what range of sequence numbers should a packet, sent by the client fall in order to be accepted by the server?

  1. 200-250
  2. 121-371
  3. 120-321
  4. 121-231
  5. 120-370

Answer(s): B

Explanation:

Package number 120 have already been received by the server and the window is 250 packets, so any package number from 121 (next in sequence) to 371 (121+250).



What are the six types of social engineering?(Choose six).

  1. Spoofing
  2. Reciprocation
  3. Social Validation
  4. Commitment
  5. Friendship
  6. Scarcity
  7. Authority
  8. Accountability

Answer(s): B,C,D,E,F,G

Explanation:

All social engineering is performed by taking advantage of human nature. For in-depth information on the subject review, read Robert Cialdini's book, Influence: Science and Practice.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts