Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Helping Hand Questions for EC0-350

Page: 25 / 32
Question 100

Jimmy, an attacker, knows that he can take advantage of poorly designed input validation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database?

Options:

A.

Jimmy can submit user input that executes an operating system command to compromise a target system

B.

Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access

C.

Jimmy can utilize an incorrect configuration that leads to access with higher-than expected privilege of the database

D.

Jimmy can utilize this particular database threat that is an SQL injection technique to penetrate a target system

Question 101

In what stage of Virus life does a stealth virus gets activated with the user performing certain actions such as running an infected program?

Options:

A.

Design

B.

Elimination

C.

Incorporation

D.

Replication

E.

Launch

F.

Detection

Question 102

Steven the hacker realizes the network administrator of Acme Corporation is using syskey in Windows 2008 Server to protect his resources in the organization. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to use brute force dictionary attacks on the hashes. Steven runs a program called "SysCracker" targeting the Windows 2008 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch the attack. How many bits does Syskey use for encryption?

Options:

A.

40-bit encryption

B.

128-bit encryption

C.

256-bit encryption

D.

64-bit encryption

Question 103

Study the following exploit code taken from a Linux machine and answer the questions below:

echo “ingreslock stream tcp nowait root /bin/sh sh –I" > /tmp/x;

/usr/sbin/inetd –s /tmp/x;

sleep 10;

/bin/ rm –f /tmp/x AAAA…AAA

In the above exploit code, the command “/bin/sh sh –I" is given.

What is the purpose, and why is ‘sh’ shown twice?

Options:

A.

The command /bin/sh sh –i appearing in the exploit code is actually part of an inetd configuration file.

B.

The length of such a buffer overflow exploit makes it prohibitive for user to enter manually.

The second ‘sh’ automates this function.

C.

It checks for the presence of a codeword (setting the environment variable) among the environment variables.

D.

It is a giveaway by the attacker that he is a script kiddy.

Page: 25 / 32
Exam Code: EC0-350
Exam Name: Ethical Hacking and Countermeasures V8
Last Update: Dec 3, 2024
Questions: 878
EC0-350 pdf

EC0-350 PDF

$29.75  $84.99
EC0-350 Engine

EC0-350 Testing Engine

$33.25  $94.99
EC0-350 PDF + Engine

EC0-350 PDF + Testing Engine

$47.25  $134.99