Free EC0-350 Exam Braindumps (page: 85)

Page 84 of 191

An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the price?

  1. By using SQL injection
  2. By using cross site scripting
  3. By changing hidden form values in a local copy of the web page
  4. There is no way the attacker could do this without directly compromising either the web server or the database

Answer(s): C

Explanation:

Changing hidden form values is possible when a web site is poorly built and is trusting the visitors computer to submit vital data, like the price of a product, to the database.



Exhibit:

You have captured some packets in Ethereal. You want to view only packets sent from 10.0.0.22. What filter will you apply?

  1. ip = 10.0.0.22
  2. ip.src == 10.0.0.22
  3. ip.equals 10.0.0.22
  4. ip.address = 10.0.0.22

Answer(s): B

Explanation:

ip.src tells the filter to only show packets with 10.0.0.22 as the source.



Spears Technology, Inc is a software development company located in Los Angeles, CaliforniA. They reported a breach in security, stating that its “security defenses has been breached and exploited for 2 weeks by hackers. “The hackers had accessed and downloaded 90, 000 address containing customer credit cards and password. Spears Technology found this attack to be so to law enforcement officials to protect their intellectual property.
How did this attack occur? The intruder entered through an employees home machine, which was connected to Spears Technology, Inc’s corporate VPN network. The application called BEAST Trojan was used in the attack to open a “Back Door” allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge.
The hackers were traced back to Beijing China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Spears Technology’s network from a remote location, posing as employees. The intent of the attacker was to steal the source code for their VOIP system and “hold it hostage” from Spears Technology, Inc exchange for ransom.
The hackers had intended on selling the stolen VOIP software source code to competitors.
How would you prevent such attacks from occurring in the future at Spears Technology?

  1. Disable VPN access to all your employees from home machines
  2. Allow VPN access but replace the standard authentication with biometric authentication
  3. Replace the VPN access with dial-up modem access to the company’s network
  4. Enable 25 character complex password policy for employees to access the VPN network.

Answer(s): A

Explanation:

As long as there is a way in for employees through all security measures you can’t be secure because you never know what computer the employees use to access recourses at their workplace.



Microsoft Authenticode technology is used for:

  1. Digital Signing Activex controls
  2. Digitally signing SSL Certificates
  3. Digitally Signing JavaScript Files
  4. Digitally Signing Java Applets

Answer(s): A

Explanation:

Authenticode identifies the publisher of signed software and verifies that it hasn't been tampered with, before users download software to their PCs. As a result, end users can make a more informed decision as to whether or not to download code. Authenticode relies on digital certificates and is based on specifications that have been used successfully in the industry for some time, including Public Key Cryptography Standards (PKCS) #7 (encrypted key specification), PKCS #10 (certificate request formats), X.509 (certificate specification), and Secure Hash Algorithm (SHA) and MD5 hash algorithms.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts