Free EC0-350 Exam Braindumps (page: 54)

Page 53 of 191

Which of the following act in the united states specifically criminalizes the transmission of unsolicited commercial e-mail(SPAM) without an existing business relationship.

  1. 2004 CANSPAM Act
  2. 2003 SPAM Preventing Act
  3. 2005 US-SPAM 1030 Act
  4. 1990 Computer Misuse Act

Answer(s): A

Explanation:

The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) establishes requirements for those who send commercial email, spells out penalties for spammers and companies whose products are advertised in spam if they violate the law, and gives consumers the right to ask emailers to stop spamming them. The law, which became effective January 1, 2004, covers email whose primary purpose is advertising or promoting a commercial product or service, including content on a Web site. A "transactional or relationship message" – email that facilitates an agreed-upon transaction or updates a customer in an existing business relationship – may not contain false or misleading routing information, but otherwise is exempt from most provisions of the CAN-SPAM Act.



Your company trainee Sandra asks you which are the four existing Regional Internet Registry (RIR's)?

  1. APNIC, PICNIC, ARIN, LACNIC
  2. RIPE NCC, LACNIC, ARIN, APNIC
  3. RIPE NCC, NANIC, ARIN, APNIC
  4. RIPE NCC, ARIN, APNIC, LATNIC

Answer(s): B

Explanation:

All other answers include non existing organizations (PICNIC, NANIC, LATNIC). See http://www.arin.net/library/internet_info/ripe.html



After a client sends a connection request (SYN) packet to the server, the server will respond (SYN-ACK) with a sequence number of its choosing, which then must be acknowledge (ACK) by the client. This sequence number is predictable; the attack connects to a service first with its own IP address, records the sequence number chosen and then opens a second connection from a forget IP address. The attack doesn’t see the SYN-ACK (or any other packet) from the server, but can guess the correct responses. If the source IP Address is used for authentication, the attacker can use the one-side communication to break into the server.
What attacks can you successfully launch against a server using the above technique?

  1. Session Hijacking attacks
  2. Denial of Service attacks
  3. Web Page defacement attacks
  4. IP Spoofing Attacks

Answer(s): A

Explanation:

The term Session Hijacking refers to the exploitation of a valid computer session - sometimes also called a session key - to gain unauthorised access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's computer.



Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?

  1. issue special cards to access secured doors at the company and provide a one-time only brief description of use of the special card
  2. to post a sign that states “no tailgating” next to the special card reader adjacent to the secured door
  3. setup a mock video camera next to the special card reader adjacent to the secured door
  4. to educate all of the employees of the company on best security practices on a recurring basis

Answer(s): D

Explanation:

Tailgating will not work in small company’s where everyone knows everyone, and neither will it work in very large companies where everyone is required to swipe a card to pass, but it’s a very simple and effective social engineering attack against mid-sized companies where it’s common for one employee not to know everyone. There is two ways of stop this attack either by buying expensive perimeter defense in form of gates that only let on employee pass at every swipe of a card or by educating every employee on a recurring basis.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts