Free EC0-350 Exam Braindumps (page: 9)

Page 8 of 191

WEP is used on 802.11 networks, what was it designed for?

  1. WEP is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what it usually expected of a wired LAN.
  2. WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a lever of integrity and privacy adequate for sensible but unclassified information.
  3. WEP is designed to provide a wireless local area network (WLAN) with a level of availability and privacy comparable to what is usually expected of a wired LAN.
  4. WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy comparable to what it usually expected of a wired LAN.

Answer(s): A

Explanation:

WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004.



Which of the following keyloggers can’t be detected by anti-virus or anti-spyware products?

  1. Hardware keylogger
  2. Software Keylogger
  3. Stealth Keylogger
  4. Convert Keylogger

Answer(s): A

Explanation:

A hardware keylogger will never interact with the operating system and therefore it will never be detected by any security programs running in the operating system.



You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024. What is this process known as?

  1. Footprinting
  2. Firewalking
  3. Enumeration
  4. Idle scanning

Answer(s): B

Explanation:

Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway.



Joe the Hacker breaks into company’s Linux system and plants a wiretap program in order to sniff passwords and user accounts off the wire. The wiretap program is embedded as a Trojan horse in one of the network utilities. Joe is worried that network administrator might detect the wiretap program by querying the interfaces to see if they are running in promiscuous mode.
Running “ifconfig –a” will produce the following:
# ifconfig –a
1o0: flags=848<UP, LOOPBACK, RUNNING, MULTICAST> mtu 8232
inet 127.0.0.1 netmask ff000000hme0:
flags=863<UP, BROADCAST, NOTRAILERS, RUNNING, PROMISC, MULTICAST> mtu
1500
inet 192.0.2.99 netmask ffffff00 broadcast 134.5.2.255 ether
8:0:20:9c:a2:35
What can Joe do to hide the wiretap program from being detected by ifconfig command?

  1. Block output to the console whenever the user runs ifconfig command by running screen capture utiliyu
  2. Run the wiretap program in stealth mode from being detected by the ifconfig command.
  3. Replace original ifconfig utility with the rootkit version of ifconfig hiding Promiscuous information being displayed on the console.
  4. You cannot disable Promiscuous mode detection on Linux systems.

Answer(s): C

Explanation:

The normal way to hide these rogue programs running on systems is the use crafted commands like ifconfig and ls.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Discussions & Posts