What do you call a system where users need to remember only one username and password, and be
authenticated for multiple services?
Real 337
EC-Council EC0-350 Exam
Clive has been monitoring his IDS and sees that there are a huge number of ICMP Echo Reply packets that
are being received on the external gateway interface. Further inspection reveals that they are not responses
from the internal hosts' requests but simply responses coming from the Internet.
What could be the most likely cause?
What would best be defined as a security test on services against a known vulnerability database using an
automated tool?
Real 338
EC-Council EC0-350 Exam
You have been called to investigate a sudden increase in network traffic at XYZ. It seems that the traffic
generated was too heavy that normal business functions could no longer be rendered to external
employees and clients. After a quick investigation, you find that the computer has
Real 340
EC-Council EC0-350 Exam
services running attached to TFN2k and Trinoo software. What do you think was the most likely cause
behind this sudden increase in traffic?
Henry is an attacker and wants to gain control of a system and use it to flood a target system with requests,
so as to prevent legitimate users from gaining access. What type of attack is Henry using?
Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to her. This
time she envisages using a different kind of method to attack Brownies Inc. Eve tries to forge the packets
and uses the broadcast address. She launches an attack similar to that of
Real 341
EC-Council EC0-350 Exam
fraggle. What is the technique that Eve used in the case above?