You are on page 1of 6

6/8/2016

Questions251260isEC1350iPadVieweriPadViewer

Return
Font

ProtectEye

CloseLight

Questions251-260
Bookmark

Shelf

ReturnList

Questions251.ThistooliswidelyusedforARPPoisoningattack.Namethetool.

A.CainandAble
B.BeatInfector
C.PoisonIvy
D.WebarpInfector
Answer:A
Explanation:
Questions252.BankerFoxisaTrojanthatisdesignedtostealusers'bankingdatarelatedto
certainbankingentities.
WhentheyaccessanywebsiteoftheaffectedbanksthroughthevulnerableFirefox3.5
browser,theTrojanisactivatedandlogstheinformationenteredbytheuser.Allthe
informationenteredinthatwebsitewillbeloggedbytheTrojanandtransmittedtothe
attacker'smachineusingcovertchannel.
BankerFoxdoesnotspreadautomaticallyusingitsownmeans.Itneedsanattackinguser's
interventioninordertoreachtheaffectedcomputer.
Whatisthemostefficientwayanattackerlocatedinremotelocationtoinfectthisbanking
Trojanonavictim'smachine?

http://wap.testsnow.net/3/3553/42240.html

1/6

6/8/2016

Questions251260isEC1350iPadVieweriPadViewer

A.Physicalaccess-theattackercansimplycopyaTrojanhorsetoavictim'sharddiskinfecting
themachineviaFirefoxadd-onextensions
B.Custompackaging-theattackercancreateacustomTrojanhorsethatmimicsthe
appearanceofaprogramthatisuniquetothatparticularcomputer
C.Custompackaging-theattackercancreateacustomTrojanhorsethatmimicsthe
appearanceofaprogramthatisuniquetothatparticularcomputer
D.Custompackaging-theattackercancreateacustomTrojanhorsethatmimicsthe
appearanceofaprogramthatisuniquetothatparticularcomputer
E.Downloadingsoftwarefromawebsite?Anattackercanofferfreesoftware,suchas
sharewareprogramsandpiratedmp3files
Answer:E
Explanation:
Questions253.Inthecontextofpasswordsecurity:asimpledictionaryattackinvolvesloading
adictionaryfile(atextfilefullofdictionarywords)intoacrackingapplicationsuchas
L0phtCrackorJohntheRipper,andrunningitagainstuseraccountslocatedbytheapplication.
Thelargerthewordandwordfragmentselection,themoreeffectivethedictionaryattackis.
Thebruteforcemethodisthemostinclusive-thoughslow.Usually,ittrieseverypossible
letterandnumbercombinationinitsautomatedexploration.Ifyouwouldusebothbruteforce
anddictionarycombinedtogethertohavevariationsofwords,whatwouldyoucallsuchan
attack?
A.FullBlownAttack
B.ThoroughAttack
C.HybridAttack
D.BruteDictAttack
Answer:C
Explanation:

http://wap.testsnow.net/3/3553/42240.html

2/6

6/8/2016

Questions251260isEC1350iPadVieweriPadViewer

Questions254.Youreceiveane-mailwiththefollowingtextmessage.
"Microsoftand
H.todaywarnedallcustomersthatanew,highlydangerousvirushasbeendiscoveredwhich
willeraseallyourfilesatmidnight.Ifthere'safilecalledhidserv.exeonyourcomputer,you
havebeeninfectedandyourcomputerisnowrunningahiddenserverthatallowshackersto
accessyourcomputer.Deletethefileimmediately.Pleasealsopassthismessagetoallyour
friendsandcolleaguesassoonaspossible."
Youlaunchyourantivirussoftwareandscanthesuspiciouslookingfilehidserv.exelocatedin
c:\windowsdirectoryandtheAVcomesoutcleanmeaningthefileisnotinfected.Youview
thefilesignatureandconfirmthatitisalegitimateWindowssystemfile"HumanInterface
DeviceService".
Whatcategoryofvirusisthis?
A.Virushoax
B.SpookyVirus
C.StealthVirus
D.PolymorphicVirus
Answer:A
Explanation:
Questions255.Chooseoneofthefollowingpseudocodestodescribethisstatement:
"Ifwehavewritten200characterstothebuffervariable,thestackshouldstopbecauseit
cannotholdanymoredata."
A.If(I>200)thenexit(1)
B.If(I<200)thenexit(1)
C.If(I<=200)thenexit(1)
D.If(I>=200)thenexit(1)
Answer:D
Explanation:
Questions256.OneoftheeffectiveDoS/DDoScountermeasuresis'Throttling'.Which
statementcorrectlydefinesthisterm?
A.Setuproutersthataccessaserverwithlogictoadjustincomingtraffictolevelsthatwillbe
safefortheservertoprocess
B.Providerscanincreasethebandwidthoncriticalconnectionstopreventthemfromgoing
downintheeventofanattack
C.Replicatingserversthatcanprovideadditionalfailsafeprotection
D.Loadbalanceeachserverinamultiple-serverarchitecture
http://wap.testsnow.net/3/3553/42240.html

3/6

6/8/2016

Questions251260isEC1350iPadVieweriPadViewer

Answer:A
Explanation:
Questions257.AttackersfootprinttargetWebsitesusingGoogleHackingtechniques.Google
hackingisatermthatreferstotheartofcreatingcomplexsearchenginequeries.Itdetects
websitesthatarevulnerabletonumerousexploitsandvulnerabilities.Googleoperatorsare
usedtolocatespecificstringsoftextwithinthesearchresults.
TheconfigurationfilecontainsbothausernameandapasswordforanSQLdatabase.Most
siteswithforumsrunaP
H.messagebase.Thisfilegivesyouthekeystothatforum,includingFULLADMINaccessto
thedatabase.WordPressusesconfig.phpthatstoresthedatabaseUsernameandPassword.
WhichofthebelowGooglesearchstringbringsupsiteswith"config.php"files?

A.Search:indexconfig/php
B.Wordpress:indexconfig.php
C.intitle:index.ofconfig.php
D.Config.php:indexlist
Answer:C
Explanation:
Questions258.WhichofthefollowingtoolwouldbeconsideredasSignatureIntegrityVerifier
(SIV)?
A.Nmap
B.SNORT
C.VirusSCAN
D.Tripwire
Answer:D
Explanation:
Questions259.BobhassetupthreewebserversonWindowsServer2008IIS7.0.Bobhas
followedalltherecommendationsforsecuringtheoperatingsystemandIIS.Theseserversare
goingtorunnumerouse-commercewebsitesthatareprojectedtobringinthousandsof
dollarsaday.Bobisstillconcernedaboutthesecurityoftheseserversbecauseofthepotential
forfinancialloss.Bobhasaskedhiscompany'sfirewalladministratortosetthefirewallto
inspectallincomingtrafficonports80and443toensurethatnomaliciousdataisgettinginto
thenetwork.
Whywillthisnotbepossible?

http://wap.testsnow.net/3/3553/42240.html

4/6

6/8/2016

Questions251260isEC1350iPadVieweriPadViewer

A.Firewallscannotinspecttrafficcomingthroughport443
B.Firewallscanonlyinspectoutboundtraffic
C.Firewallscannotinspecttrafficatall,theycanonlyblockorallowcertainports
D.Firewallscannotinspecttrafficcomingthroughport80
Answer:C
Explanation:
Questions260.WhichofthefollowingstatementcorrectlydefinesICMPFloodAttack?(Select
2answers)

A.BogusEC
H.replypacketsarefloodedonthenetworkspoofingtheIPandMACaddress
B.TheICMPpacketssignalthevictimsystemtoreplyandthecombinationoftrafficsaturates
thebandwidthofthevictim'snetwork
C.EC
H.packetsarefloodedonthenetworksaturatingthebandwidthofthesubnetcausingdenial
ofservice
D.ADDoSICMPfloodattackoccurswhenthezombiessendlargevolumesof
ICMP_ECHO_REPLYpacketstothevictimsystem.
Answer:B,D
Explanation:
Pre

http://wap.testsnow.net/3/3553/42240.html

List

Next

5/6

6/8/2016

Questions251260isEC1350iPadVieweriPadViewer

Home

http://wap.testsnow.net/3/3553/42240.html

PCVersion

MyBook

Free

6/6

You might also like