Free EC0-350 Exam Braindumps (page: 5)

Page 4 of 191

Doug is conducting a port scan of a target network. He knows that his client target network has a web server and that there is a mail server also which is up and running. Doug has been sweeping the network but has not been able to elicit any response from the remote target. Which of the following could be the most likely cause behind this lack of response? Select 4.

  1. UDP is filtered by a gateway
  2. The packet TTL value is too low and cannot reach the target
  3. The host might be down
  4. The destination network might be down
  5. The TCP windows size does not match
  6. ICMP is filtered by a gateway

Answer(s): A,B,C,F

Explanation:

If the destination host or the destination network is down there is no way to get an answer and if TTL (Time To Live) is set too low the UDP packets will “die” before reaching the host because of too many hops between the scanning computer and the target. The TCP receive window size is the amount of received data (in bytes) that can be buffered during a connection. The sending host can send only that amount of data before it must wait for an acknowledgment and window update from the receiving host and ICMP is mainly used for echo requests and not in port scans.



You are footprinting Acme.com to gather competitive intelligence. You visit the acme.com websire for contact information and telephone number numbers but do not find it listed there. You know that they had the entire staff directory listed on their website 12 months ago but now it is not there. How would it be possible for you to retrieve information from the website that is outdated?

  1. Visit google search engine and view the cached copy.
  2. Visit Archive.org site to retrieve the Internet archive of the acme website.
  3. Crawl the entire website and store them into your computer.
  4. Visit the company’s partners and customers website for this information.

Answer(s): B

Explanation:

The Internet Archive (IA) is a non-profit organization dedicated to maintaining an archive of Web and multimedia resources. Located at the Presidio in San Francisco, California, this archive includes "snapshots of the World Wide Web" (archived copies of pages, taken at various points in time), software, movies, books, and audio recordings (including recordings of live concerts from bands that allow it). This site is found at www.archive.org.



Bob is going to perform an active session hijack against company. He has acquired the target that allows session oriented connections (Telnet) and performs sequence prediction on the target operating system. He manages to find an active session due to the high level of traffic on the network.
So, what is Bob most likely to do next?

  1. Take over the session.
  2. Reverse sequence prediction.
  3. Guess the sequence numbers.
  4. Take one of the parties’ offline.

Answer(s): C



Sara is making use of Digest Authentication for her Web site. Why is this considered to be more secure than Basic authentication?

  1. Basic authentication is broken
  2. The password is never sent in clear text over the network
  3. The password sent in clear text over the network is never reused.
  4. It is based on Kerberos authentication protocol

Answer(s): B

Explanation:

Digest access authentication is one of the agreed methods a web page can use to negotiate credentials with a web user (using the HTTP protocol). This method builds upon (and obsoletes) the basic authentication scheme, allowing user identity to be established without having to send a password in plaintext over the network.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts