Course Hero Logo

Computer-Hacking-Forensic-Investigator-(EC0-349).pdf -...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 9 pages.

EC0-349ECCouncilComputer Hacking Forensic Investigator
EC0-349B. TrinooC. FraggleD. SYN floodAnswer:AQUESTION:358Kyle is performing the final testing of an application he developed for the accountingdepartment. His last round of testing is to ensure that the program is as secure aspossible. Kyle runs the following command. What is he testing at this point?#include#include int main(int argc, char *argv[]) {char buffer[10];if (argc < 2) {fprintf (stderr, "USAGE: %s string\n",argv[0]);return 1;}strcpy(buffer, argv[1]);return 0;}
QUESTION:359You are running known exploits against your network to test for possiblevulnerabilities. To test the strength of your virus software, you load a test network tomimic your production network. Your software successfully blocks some simplemacro and encrypted viruses. You decide to really test the software by using viruscode where the code rewrites itself entirely and the signatures change from child tochild, but the functionality stays the same. What type of virus is this that you aretesting?
119
EC0-349D. TransmorphicAnswer:BQUESTION:360What is a good security method to prevent unauthorized users from "tailgating"?
QUESTION:361You are the security analyst working for a private company out of France. Yourcurrent assignment is to obtain credit card information from a Swiss bank owned bythat company. After initial reconnaissance, you discover that the bank securitydefenses are very strong and would take too long to penetrate. You decide to get theinformation by monitoring the traffic between the bank and one of its subsidiaries inLondon. After monitoring some of the traffic, you see a lot of FTP packets travelingback and forth. You want to sniff the traffic and extract usernames and passwords.What tool could you use to get this information?A. AirsnortB. SnortC. EttercapD. RaidSniffAnswer:C

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Mohammad Alizadeh
Tags
Computer network, Transmission Control Protocol, Julia

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture