Free EC0-350 Exam Braindumps (page: 66)

Page 65 of 191

Bob, an Administrator at company was furious when he discovered that his buddy Trent, has launched a session hijack attack against his network, and sniffed on his communication, including administrative tasks suck as configuring routers, firewalls, IDS, via Telnet.
Bob, being an unhappy administrator, seeks your help to assist him in ensuring that attackers such as Trent will not be able to launch a session hijack in company.
Based on the above scenario, please choose which would be your corrective measurement actions (Choose two)

  1. Use encrypted protocols, like those found in the OpenSSH suite.
  2. Implement FAT32 filesystem for faster indexing and improved performance.
  3. Configure the appropriate spoof rules on gateways (internal and external).
  4. Monitor for CRP caches, by using IDS products.

Answer(s): A,C

Explanation:

First you should encrypt the data passed between the parties; in particular the session key. This technique is widely relied-upon by web-based banks and other e-commerce services, because it completely prevents sniffing-style attacks. However, it could still be possible to perform some other kind of session hijack. By configuring the appropriate spoof rules you prevent the attacker from using the same IP address as the victim as thus you can implement secondary check to see that the IP does not change in the middle of the session.



Rebecca is a security analyst and knows of a local root exploit that has the ability to enable local users to use available exploits to gain root privileges. This vulnerability exploits a condition in the Linux kernel within the execve() system call. There is no known workaround that exists for this vulnerability. What is the correct action to be taken by Rebecca in this situation as a recommendation to management?

  1. Rebecca should make a recommendation to disable the () system call
  2. Rebecca should make a recommendation to upgrade the Linux kernel promptly
  3. Rebecca should make a recommendation to set all child-process to sleep within the execve()
  4. Rebecca should make a recommendation to hire more system administrators to monitor all child processes to ensure that each child process can't elevate privilege

Answer(s): B



Stephanie works as a records clerk in a large office building in downtown Chicago. On Monday, she went to a mandatory security awareness class (Security5) put on by her company's IT department. During the class, the IT department informed all employees that everyone's Internet activity was thenceforth going to be monitored.
Stephanie is worried that her Internet activity might give her supervisor reason to write her up, or worse get her fired. Stephanie's daily work duties only consume about four hours of her time, so she usually spends the rest of the day surfing the web. Stephanie really enjoys surfing the Internet but definitely does not want to get fired for it.
What should Stephanie use so that she does not get in trouble for surfing the Internet?

  1. Cookie Disabler
  2. Stealth Anonymizer
  3. Stealth Firefox
  4. Stealth IE

Answer(s): C

Explanation:

Stealth Firefox If there are times you want to surf the web without leaving a trace in your local computer, then this is the right extension for you. https://addons.mozilla.org/en-US/firefox/addon/1306



Which of the following tools can be used to perform a zone transfer?

  1. NSLookup
  2. Finger
  3. Dig
  4. Sam Spade
  5. Host
  6. Netcat
  7. Neotrace

Answer(s): A,C,D,E

Explanation:

There are a number of tools that can be used to perform a zone transfer. Some of these include: NSLookup, Host, Dig, and Sam Spade.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts