Free EC0-350 Exam Braindumps (page: 7)

Page 6 of 191

Assuring two systems that are using IPSec to protect traffic over the internet, what type of general attack could compromise the data?

  1. Spoof Attack
  2. Smurf Attack
  3. Man in the Middle Attack
  4. Trojan Horse Attack
  5. Back Orifice Attack

Answer(s): D,E

Explanation:

To compromise the data, the attack would need to be executed before the encryption takes place at either end of the tunnel. Trojan Horse and Back Orifice attacks both allow for potential data manipulation on host computers. In both cases, the data would be compromised either before encryption or after decryption, so IPsec is not preventing the attack.



The evil hacker, is purposely sending fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65, 536 bytes. From the information given, what type of attack is attempting to perform?

  1. Syn flood
  2. Smurf
  3. Ping of death
  4. Fraggle

Answer(s): C


Reference:

http://insecure.org/sploits/ping-o-death.html



Exhibit:
ettercap –NCLzs --quiet
What does the command in the exhibit do in “Ettercap”?

  1. This command will provide you the entire list of hosts in the LAN
  2. This command will check if someone is poisoning you and will report its IP.
  3. This command will detach from console and log all the collected passwords from the network to a file.
  4. This command broadcasts ping to scan the LAN instead of ARP request of all the subnet IPs.

Answer(s): C

Explanation:

-N = NON interactive mode (without ncurses)
-C = collect all users and passwords
-L = if used with -C (collector) it creates a file with all the password sniffed in the session in the form "YYYYMMDD-collected-pass.log"
-z = start in silent mode (no arp storm on start up)
-s = IP BASED sniffing
--quiet = "demonize" ettercap. Useful if you want to log all data in background.



You have been using the msadc.pl attack script to execute arbitrary commands on an NT4 web server. While it is effective, you find it tedious to perform extended functions. On further research you come across a perl script that runs the following msadc functions:

What kind of exploit is indicated by this script?

  1. A buffer overflow exploit.
  2. A SUID exploit.
  3. A SQL injection exploit.
  4. A chained exploit.
  5. A buffer under run exploit.

Answer(s): D






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts