Free EC0-350 Exam Braindumps (page: 82)

Page 81 of 191

Which programming language is NOT vulnerable to buffer overflow attacks?

  1. Java
  2. ActiveX
  3. C++
  4. Assembly Language

Answer(s): A

Explanation:

Perl and Java has boundary checking, hence buffer overflows don't occur. On the other hand, Perl and Java don't offer access to the system that is as deep as some programs need.



Jacob would like your advice on using a wireless hacking tool that can save him time and get him better results with lesser packets. You would like to recommend a tool that uses KoreK's implementation. Which tool would you recommend from the list below?

  1. Kismet
  2. Shmoo
  3. Aircrack
  4. John the Ripper

Answer(s): C

Explanation:

Implementing KoreK's attacks as well as improved FMS, aircrack provides the fastest and most effective statistical attacks available. John the Ripper is a password cracker, Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system, and



Snort is an open source Intrusion Detection system. However, it can also be used for a few other purposes as well.
Which of the choices below indicate the other features offered by Snort?

  1. IDS, Packet Logger, Sniffer
  2. IDS, Firewall, Sniffer
  3. IDS, Sniffer, Proxy
  4. IDS, Sniffer, content inspector

Answer(s): A

Explanation:

Snort is a free software network intrusion detection and prevention system capable of performing packet logging & real-time traffic analysis, on IP networks. Snort was written by Martin Roesch but is now owned and developed by Sourcefire



Clive is conducting a pen-test and has just port scanned a system on the network. He has identified the operating system as Linux and been able to elicit responses from ports 23, 25 and 53. He infers port 23 as running Telnet service, port 25 as running SMTP service and port 53 as running DNS service. The client confirms these findings and attests to the current availability of the services. When he tries to telnet to port 23 or 25, he gets a blank screen in response. On typing other commands, he sees only blank spaces or underscores symbols on the screen. What are you most likely to infer from this?

  1. The services are protected by TCP wrappers
  2. There is a honeypot running on the scanned machine
  3. An attacker has replaced the services with trojaned ones
  4. This indicates that the telnet and SMTP server have crashed

Answer(s): A

Explanation:

TCP Wrapper is a host-based network ACL system, used to filter network access to Internet protocol services run on (Unix-like) operating systems such as Linux or BSD. It allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens on which to filter for access control purposes.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts