Free EC0-350 Exam Braindumps (page: 45)

Page 44 of 191

Bryan notices the error on the web page and asks Liza to enter liza' or '1'='1 in the email field. They are greeted with a message "Your login information has been mailed to johndoe@gmail.com". What do you think has occurred?

  1. The web application picked up a record at random
  2. The web application returned the first record it found
  3. The server error has caused the application to malfunction
  4. The web application emailed the administrator about the error

Answer(s): B

Explanation:

The web application sends a query to an SQL database and by giving it the criteria 1=1, which always will be true, it will return the first value it finds.



What are the three phases involved in security testing?

  1. Reconnaissance, Conduct, Report
  2. Reconnaissance, Scanning, Conclusion
  3. Preparation, Conduct, Conclusion
  4. Preparation, Conduct, Billing

Answer(s): C

Explanation:

Preparation phase - A formal contract is executed containing non-disclosure of the client's data and legal protection for the tester. At a minimum, it also lists the IP addresses to be tested and time to test.
Conduct phase - In this phase the penetration test is executed, with the tester looking for potential vulnerabilities.
Conclusion phase - The results of the evaluation are communicated to the pre-defined organizational contact, and corrective action is advised.



You suspect that your Windows machine has been compromised with a Trojan virus. When you run anti-virus software it does not pick of the Trojan. Next you run netstat command to look for open ports and you notice a strange port 6666 open.
What is the next step you would do?

  1. Re-install the operating system.
  2. Re-run anti-virus software.
  3. Install and run Trojan removal software.
  4. Run utility fport and look for the application executable that listens on port 6666.

Answer(s): D

Explanation:

Fport reports all open TCP/IP and UDP ports and maps them to the owning application. This is the same information you would see using the 'netstat -an' command, but it also maps those ports to running processes with the PID, process name and path. Fport can be used to quickly identify unknown open ports and their associated applications.



What is the term 8 to describe an attack that falsifies a broadcast ICMP echo request and includes a primary and secondary victim?

  1. Fraggle Attack
  2. Man in the Middle Attack
  3. Trojan Horse Attack
  4. Smurf Attack
  5. Back Orifice Attack

Answer(s): D

Explanation:

Trojan and Back orifice are Trojan horse attacks. Man in the middle spoofs the Ip and redirects the victems packets to the cracker The infamous Smurf attack. preys on ICMP's capability to send traffic to the broadcast address. Many hosts can listen and respond to a single ICMP echo request sent to a broadcast address.
Network Intrusion Detection third Edition by Stephen Northcutt and Judy Novak pg 70 The "smurf" attack's cousin is called "fraggle", which uses UDP echo packets in the same fashion as the ICMP echo packets; it was a simple re-write of "smurf".






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts