Free EC0-350 Exam Braindumps (page: 62)

Page 61 of 191

After studying the following log entries, how many user IDs can you identify that the attacker has tampered with?
1. mkdir -p /etc/X11/applnk/Internet/.etc
2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd
3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd
4. touch -acmr /etc /etc/X11/applnk/Internet/.etc
5. passwd nobody -d
6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash
7. passwd dns -d
8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd
9. touch -acmr /etc/X11/applnk/Internet/.etc /etc

  1. IUSR_
  2. acmr, dns
  3. nobody, dns
  4. nobody, IUSR_

Answer(s): C

Explanation:

Passwd is the command used to modify a user password and it has been used together with the usernames nobody and dns.



Theresa is the chief information security officer for her company, a large shipping company based out of New York City. In the past, Theresa and her IT employees manually checked the status of client computers on the network to see if they had the most recent Microsoft updates. Now that the company has added over 100 more clients to accommodate new departments, Theresa must find some kind of tool to see whether the clients are up-to-date or not. Theresa decides to use Qfecheck to monitor all client computers. When Theresa runs the tool, she is repeatedly told that the software does not have the proper permissions to scan. Theresa is worried that the operating system hardening that she performs on all clients is keeping the software from scanning the necessary registry keys on the client computers.
What registry key permission should Theresa check to ensure that Qfecheck runs properly?

  1. In order for Qfecheck to run properly, it must have enough permission to read
  2. She needs to check the permissions of the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates registry key
  3. Theresa needs to look over the permissions of the registry key
  4. The registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Microsoft must be checked

Answer(s): B

Explanation:

Qfecheck check the registry HKLM\Software\Microsoft\Updates



MX record priority increases as the number increases.(True/False.

  1. True
  2. False

Answer(s): B

Explanation:

The highest priority MX record has the lowest number.



This kind of password cracking method uses word lists in combination with numbers and special characters:

  1. Hybrid
  2. Linear
  3. Symmetric
  4. Brute Force

Answer(s): A

Explanation:

A Hybrid (or Hybrid Dictionary) Attack uses a word list that it modifies slightly to find passwords that are almost from a dictionary (like St0pid)






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts