Free EC0-350 Exam Braindumps (page: 74)

Page 73 of 191

Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network. What other steps does Bob have to take in order to successfully implement this? (Select 2 answer.)

  1. Train users in the new policy.
  2. Disable all wireless protocols at the firewall.
  3. Disable SNMP on the network so that wireless devices cannot be configured.
  4. Continuously survey the area for wireless devices.

Answer(s): A,D

Explanation:

If someone installs a access point and connect it to the network there is no way to find it unless you are constantly surveying the area for wireless devices. SNMP and firewalls can not prevent the installation of wireless devices on the corporate network.



Look at the following SQL query.
SELECT * FROM product WHERE PCategory='computers' or 1=1--'
What will it return?
Select the best answer.

  1. All computers and all 1's
  2. All computers
  3. All computers and everything else
  4. Everything except computers

Answer(s): C

Explanation:

The 1=1 tells the SQL database to return everything, a simplified statement would be SELECT * FROM product WHERE 1=1 (which will always be true for all columns). Thus, this query will return all computers and everything else. The or 1=1 is a common test to see if a web application is vulnerable to a SQL attack.



What do you conclude from the nmap results below?
Staring nmap V. 3.10ALPHA0 (www.insecure.org/map/)
(The 1592 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
443/tcp open https
Remote operating system guess: Too many signatures match the reliability guess the OS. Nmap run completed – 1 IP address (1 host up) scanned in 91.66 seconds

  1. The system is a Windows Domain Controller.
  2. The system is not firewalled.
  3. The system is not running Linux or Solaris.
  4. The system is not properly patched.

Answer(s): B

Explanation:

There is no reports of any ports being filtered.



Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call such a host?

  1. Honeypot
  2. DMZ host
  3. DWZ host
  4. Bastion Host

Answer(s): D

Explanation:

A bastion host is a gateway between an inside network and an outside network. Used as a security measure, the bastion host is designed to defend against attacks aimed at the inside network. Depending on a network's complexity and configuration, a single bastion host may stand guard by itself, or be part of a larger security system with different layers of protection.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts