Free EC0-350 Exam Braindumps (page: 8)

Page 7 of 191

A client has approached you with a penetration test requirements. They are concerned with the possibility of external threat, and have invested considerable resources in protecting their Internet exposure. However, their main concern is the possibility of an employee elevating his/her privileges and gaining access to information outside of their respective department.
What kind of penetration test would you recommend that would best address the client’s concern?

  1. A Black Box test
  2. A Black Hat test
  3. A Grey Box test
  4. A Grey Hat test
  5. A White Box test
  6. A White Hat test

Answer(s): C



Which is the Novell Netware Packet signature level used to sign all packets ?

  1. 0
  2. 1
  3. 2
  4. 3

Answer(s): D

Explanation:

Level 0 is no signature, Level 3 is communication using signature only.



An attacker runs netcat tool to transfer a secret file between two hosts.
Machine A: netcat -1 –p 1234 < secretfile
Machine B: netcat 192.168.3.4 > 1234
He is worried about information being sniffed on the network.
How would the attacker use netcat to encrypt information before transmitting it on the wire?

  1. Machine A: netcat -1 –p –s password 1234 < testfile
    Machine B: netcat <machine A IP> 1234
  2. Machine A: netcat -1 –e magickey –p 1234 < testfile
    Machine B: netcat <machine A IP> 1234
  3. Machine A: netcat -1 –p 1234 < testfile –pw password
    Machine B: netcat <machine A IP> 1234 –pw password
  4. Use cryptcat instead of netcat.

Answer(s): D

Explanation:

Cryptcat is the standard netcat enhanced with twofish encryption with ports for WIndows NT, BSD and Linux. Twofish is courtesy of counterpane, and cryptix. A default netcat installation does not contain any cryptography support.



What are the main drawbacks for anti-virus software?

  1. AV software is difficult to keep up to the current revisions.
  2. AV software can detect viruses but can take no action.
  3. AV software is signature driven so new exploits are not detected.
  4. It’s relatively easy for an attacker to change the anatomy of an attack to bypass AV systems
  5. AV software isn’t available on all major operating systems platforms.
  6. AV software is very machine (hardware) dependent.

Answer(s): C

Explanation:

Although there are functions like heuristic scanning and sandbox technology, the Antivirus program is still mainly depending of signature databases and can only find already known viruses.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts