Free EC0-350 Exam Braindumps (page: 51)

Page 50 of 191

Which of the following display filters will you enable in Ethereal to view the three-way handshake for a connection from host 192.168.0.1?

  1. ip == 192.168.0.1 and tcp.syn
  2. ip.addr = 192.168.0.1 and syn = 1
  3. ip.addr==192.168.0.1 and tcp.flags.syn
  4. ip.equals 192.168.0.1 and syn.equals on

Answer(s): C



A simple compiler technique used by programmers is to add a terminator 'canary word' containing four letters NULL (0x00), CR (0x0d), LF (0x0a) and EOF (0xff) so that most string operations are terminated. If the canary word has been altered when the function returns, and the program responds by emitting an intruder alert into syslog, and then halts what does it indicate?

  1. The system has crashed
  2. A buffer overflow attack has been attempted
  3. A buffer overflow attack has already occurred
  4. A firewall has been breached and this is logged
  5. An intrusion detection system has been triggered

Answer(s): B

Explanation:

Terminator Canaries are based on the observation that most buffer overflows and stack smash attacks are based on certain string operations which end at terminators. The reaction to this observation is that the canaries are built of NULL terminators, CR, LF, and -1. The undesirable result is that the canary is known.



You just purchased the latest DELL computer, which comes pre-installed with Windows XP, McAfee antivirus software and a host of other applications. You want to connect Ethernet wire to your cable modem and start using the computer immediately.
Windows is dangerously insecure when unpacked from the box, and there are a few things that you must do before you use it.

  1. New Installation of Windows Should be patched by installation the latest service packs and hotfixes
  2. Enable “guest” account
  3. Install a personal firewall and lock down unused ports from connecting to your computer
  4. Install the latest signatures for Antivirus software
  5. Configure “Windows Update” to automatic
  6. Create a non-admin user with a complex password and login to this account

Answer(s): A,C,D,E,F

Explanation:

The guest account is a possible vulnerability to your system so you should not enable it unless needed. Otherwise you should perform all other actions mentioned in order to have a secure system.



How many bits encryption does SHA-1 use?

  1. 64 bits
  2. 128 bits
  3. 160 bits
  4. 256 bits

Answer(s): C

Explanation:

SHA-1 (as well as SHA-0) produces a 160-bit digest from a message with a maximum length of 264 - 1 bits, and is based on principles similar to those used by Professor Ronald L. Rivest of MIT in the design of the MD4 and MD5 message digest algorithms.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts