Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup

Transcript
ECE = 64
CWR =128
Example: To calculate SYN/ACK flag decimal value, add 2 (which is the decimal value of the SYN flag) to 16
(which is the decimal value of the ACK flag), so the result would be 18.
Based on the above calculation, what is the decimal value for XMAS scan?
A.
B.
C.
D.
23
24
41
64
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 164
A simple compiler technique used by programmers is to add a terminator 'canary word' containing four letters
NULL (0x00), CR (0x0d), LF (0x0a) and EOF (0xff) so that most string operations are terminated. If the canary
word has been altered when the function returns, and the program responds by emitting an intruder alert into
syslog, and then halts what does it indicate?
A.
B.
C.
D.
E.
A buffer overflow attack has been attempted
A buffer overflow attack has already occurred
A firewall has been breached and this is logged
An intrusion detection system has been triggered
The system has crashed
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 165
This is an example of whois record.