Free EC0-350 Exam Braindumps (page: 56)

Page 55 of 191

John the hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct MiTM attack. What is the destination MAC address of a broadcast frame?

  1. 0xFFFFFFFFFFFF
  2. 0xAAAAAAAAAAAA
  3. 0xBBBBBBBBBBBB
  4. 0xDDDDDDDDDDDD

Answer(s): A

Explanation:

0xFFFFFFFFFFFF is the destination MAC address of the broadcast frame.



Choose one of the following pseudo codes to describe this statement:
If we have written 200 characters to the buffer variable, the stack should stop because it cannot hold any more data.

  1. If (I > 200) then exit (1)
  2. If (I < 200) then exit (1)
  3. If (I <= 200) then exit (1)
  4. If (I >= 200) then exit (1)

Answer(s): D



_____ is a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length.

  1. Bit Cipher
  2. Hash Cipher
  3. Block Cipher
  4. Stream Cipher

Answer(s): C

Explanation:

A block cipher is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. When encrypting, a block cipher might take a (for example) 128-bit block of plaintext as input, and output a corresponding 128-bit block of ciphertext.



A particular database threat utilizes a SQL injection technique to penetrate a target system. How would an attacker use this technique to compromise a database?

  1. An attacker uses poorly designed input validation routines to create or alter SQL commands to gain access to unintended data or execute commands of the database
  2. An attacker submits user input that executes an operating system command to compromise a target system
  3. An attacker gains control of system to flood the target system with requests, preventing legitimate users from gaining access
  4. An attacker utilizes an incorrect configuration that leads to access with higher-than-expected privilege of the database

Answer(s): A

Explanation:

Using the poorly designed input validation to alter or steal data from a database is a SQL injection attack.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts