Free EC0-350 Exam Braindumps (page: 76)

Page 75 of 191

What is the BEST alternative if you discover that a rootkit has been installed on one of your computers?

  1. Copy the system files from a known good system
  2. Perform a trap and trace
  3. Delete the files and try to determine the source
  4. Reload from a previous backup
  5. Reload from known good media

Answer(s): E

Explanation:

If a rootkit is discovered, you will need to reload from known good media. This typically means performing a complete reinstall.



Sabotage, Advertising and Covering are the three stages of _____

  1. Social engineering
  2. Reverse Social Engineering
  3. Reverse Software Engineering
  4. Rapid Development Engineering

Answer(s): B

Explanation:

Typical social interaction dictates that if someone gives us something then it is only right for us to return the favour. This is known as reverse social engineering, when an attacker sets up a situation where the victim encounters a problem, they ask the attacker for help and once the problem is solved the victim then feels obliged to give the information requested by the attacker.



_____ ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at.

  1. Mandatory Access Control
  2. Authorized Access Control
  3. Role-based Access Control
  4. Discretionary Access Control

Answer(s): A

Explanation:

In computer security, mandatory access control (MAC) is a kind of access control, defined by the TCSEC as "a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity."



Bubba has just accessed he preferred ecommerce web site and has spotted an item that he would like to buy. Bubba considers the price a bit too steep. He looks at the source code of the webpage and decides to save the page locally, so that he can modify the page variables. In the context of web application security, what do you think Bubba has changes?

  1. A hidden form field value.
  2. A hidden price value.
  3. An integer variable.
  4. A page cannot be changed locally, as it is served by a web server.

Answer(s): A






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts