Free EC0-350 Exam Braindumps (page: 57)

Page 56 of 191

While probing an organization you discover that they have a wireless network. From your attempts to connect to the WLAN you determine that they have deployed MAC filtering by using ACL on the access points. What would be the easiest way to circumvent and communicate on the WLAN?

  1. Attempt to crack the WEP key using Airsnort.
  2. Attempt to brute force the access point and update or delete the MAC ACL.
  3. Steel a client computer and use it to access the wireless network.
  4. Sniff traffic if the WLAN and spoof your MAC address to one that you captured.

Answer(s): D

Explanation:

The easiest way to gain access to the WLAN would be to spoof your MAC address to one that already exists on the network.



While scanning a network you observe that all of the web servers in the DMZ are responding to ACK packets on port 80.
What can you infer from this observation?

  1. They are using Windows based web servers.
  2. They are using UNIX based web servers.
  3. They are not using an intrusion detection system.
  4. They are not using a stateful inspection firewall.

Answer(s): D

Explanation:

If they used a stateful inspection firewall this firewall would know if there has been a SYN-ACK before the ACK.



Which of the following snort rules look for FTP root login attempts?

  1. alert tcp -> any port 21 (msg:"user root";)
  2. alert tcp -> any port 21 (message:"user root";)
  3. alert ftp -> ftp (content:"user password root";)
  4. alert tcp any any -> any any 21 (content:"user root";)

Answer(s): D

Explanation:

The snort rule header is built by defining action (alert), protocol (tcp), from IP subnet port (any any), to IP subnet port (any any 21), Payload Detection Rule Options (content:”user root”;)



Marshall is the information security manager for his company. Marshall was just hired on two months ago after the last information security manager retired. Since the last manager did not implement or even write IT policies, Marshall has begun writing IT security policies to cover every conceivable aspect. Marshall's supervisor has informed him that while most employees will be under one set of policies, ten other employees will be under another since they work on computers in publicly-accessible areas. Per his supervisor, Marshall has written two sets of policies. For the users working on publicly-accessible computers, their policies state that everything is forbidden. They are not allowed to browse the Internet or even use email. The only thing they can use is their work related applications like Word and Excel.
What types of policies has Marshall written for the users working on computers in the publicly-accessible areas?

  1. He has implemented Permissive policies for the users working on public computers
  2. These types of policies would be considered Promiscuous policies
  3. He has written Paranoid policies for these users in public areas
  4. Marshall has created Prudent policies for the computer users in publicly-accessible areas

Answer(s): C

Explanation:

It says that everything is forbidden, this means that there is a Paranoid Policy implemented






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts