Free EC0-350 Exam Braindumps (page: 53)

Page 52 of 191

You have installed antivirus software and you want to be sure that your AV signatures are working correctly. You don't want to risk the deliberate introduction of a live virus to test the AV software. You would like to write a harmless test virus, which is based on the European Institute for Computer Antivirus Research format that can be detected by the AV software.

How should you proceed?

  1. Type the following code in notepad and save the file as SAMPLEVIRUS.COM. Your antivirus program springs into action whenever you attempt to open, run or copy it.
    X5O!P%@AP[4\PZX54(P^)7CC)7}$SAMPLEVIRUS-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  2. Type the following code in notepad and save the file as AVFILE.COM. Your antivirus program springs into action whenever you attempt to open, run or copy it.
    X5O!P%@AP[4\PZX54(P^)7CC)7}$AVFILE-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  3. Type the following code in notepad and save the file as TESTAV.COM. Your antivirus program springs into action whenever you attempt to open, run or copy it.
    X5O!P%@AP[4\PZX54(P^)7CC)7}$TESTAV-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  4. Type the following code in notepad and save the file as EICAR.COM. Your antivirus program springs into action whenever you attempt to open, run or copy it.
    X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Answer(s): D

Explanation:

The EICAR test file (official name: EICAR Standard Anti-Virus Test File) is a file, developed by the European Institute for Computer
Antivirus Research, to test the response of computer antivirus (AV) programs. The rationale behind it is to allow people, companies, and AV programmers
to test their software without having to use a real computer virus that could cause actual damage should the AV not respond correctly. EICAR likens
the use of a live virus to test AV software to setting a fire in a trashcan to test a fire alarm, and promotes the EICAR test file as a safe alternative.



One of your team members has asked you to analyze the following SOA record. What is the TTL?
Rutgers.edu.SOA NS1.Rutgers.edu ipad.college.edu (200302028 3600
3600 604800 2400.

  1. 200303028
  2. 3600
  3. 604800
  4. 2400
  5. 60
  6. 4800

Answer(s): D

Explanation:

The SOA includes a timeout value. This value can tell an attacker how long any DNS "poisoning" would last. It is the last set of numbers in the record.



Which of the following LM hashes represent a password of less than 8 characters? (Select 2)

  1. BA810DBA98995F1817306D272A9441BB
  2. 44EFCE164AB921CQAAD3B435B51404EE
  3. 0182BD0BD4444BF836077A718CCDF409
  4. CEC52EB9C8E3455DC2265B23734E0DAC
  5. B757BF5C0D87772FAAD3B435B51404EE
  6. E52CAC67419A9A224A3B108F3FA6CB6D

Answer(s): B,E

Explanation:

Notice the last 8 characters are the same



War dialing is a very old attack and depicted in movies that were made years ago.
Why would a modem security tester consider using such an old technique?

  1. It is cool, and if it works in the movies it must work in real life.
  2. It allows circumvention of protection mechanisms by being on the internal network.
  3. It allows circumvention of the company PBX.
  4. A good security tester would not use such a derelict technique.

Answer(s): B

Explanation:

If you are lucky and find a modem that answers and is connected to the target network, it usually is less protected (as only employees are supposed to know of its existence) and once connected you don’t need to take evasive actions towards any firewalls or IDS.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts