Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

EC0-350 Ethical Hacking and Countermeasures V8 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

EC0-350 Practice Questions

Ethical Hacking and Countermeasures V8

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable EC0-350 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about EC0-350. Use this test to pinpoint which areas you need to focus your study on.

EC0-350 PDF

EC0-350 PDF (Printable)
$43.75
$124.99

EC0-350 Testing Engine

EC0-350 PDF (Printable)
$50.75
$144.99

EC0-350 PDF + Testing Engine

EC0-350 PDF (Printable)
$63.7
$181.99
Question # 101

Information gathered from social networking websites such as Facebook, Twitter and LinkedIn can be used to launch which of the following types of attacks? (Choose two.)

Options:

A.  

Smurf attack

B.  

Social engineering attack

C.  

SQL injection attack

D.  

Phishing attack

E.  

Fraggle attack

F.  

Distributed denial of service attack

Discussion 0
Question # 102

A botnet can be managed through which of the following?

Options:

A.  

IRC

B.  

E-Mail

C.  

Linkedin and Facebook

D.  

A vulnerable FTP server

Discussion 0
Question # 103

In which step Steganography fits in CEH System Hacking Cycle (SHC)

Options:

A.  

Step 2: Crack the password

B.  

Step 1: Enumerate users

C.  

Step 3: Escalate privileges

D.  

Step 4: Execute applications

E.  

Step 5: Hide files

F.  

Step 6: Cover your tracks

Discussion 0
Question # 104

What techniques would you use to evade IDS during a Port Scan? (Select 4 answers)

Options:

A.  

Use fragmented IP packets

B.  

Spoof your IP address when launching attacks and sniff responses from the server

C.  

Overload the IDS with Junk traffic to mask your scan

D.  

Use source routing (if possible)

E.  

Connect to proxy servers or compromised Trojaned machines to launch attacks

Discussion 0
Question # 105

Which port, when configured on a switch receives a copy of every packet that passes through it?

Question # 105

Options:

A.  

R-DUPE Port

B.  

MIRROR port

C.  

SPAN port

D.  

PORTMON

Discussion 0
Question # 106

Charlie is the network administrator for his company. Charlie just received a new Cisco router and wants to test its capabilities out and to see if it might be susceptible to a DoS attack resulting in its locking up. The IP address of the Cisco switch is 172.16.0.45. What command can Charlie use to attempt this task?

Options:

A.  

Charlie can use the comman

D.  

ping -l 56550 172.16.0.45 -t.

B.  

Charlie can try using the comman

D.  

ping 56550 172.16.0.45.

C.  

By using the command ping 172.16.0.45 Charlie would be able to lockup the router

D.  

He could use the comman

D.  

ping -4 56550 172.16.0.45.

Discussion 0
Question # 107

Gerald, the Systems Administrator for Hyped Enterprises, has just discovered that his network has been breached by an outside attacker. After performing routine maintenance on his servers, he discovers numerous remote tools were installed that no one claims to have knowledge of in his department. Gerald logs onto the management console for his IDS and discovers an unknown IP address that scanned his network constantly for a week and was able to access his network through a high-level port that was not closed. Gerald traces the IP address he found in the IDS log to a proxy server in Brazil. Gerald calls the company that owns the proxy server and after searching through their logs, they trace the source to another proxy server in Switzerland. Gerald calls the company in Switzerland that owns the proxy server and after scanning through the logs again, they trace the source back to a proxy server in China. What proxy tool has Gerald's attacker used to cover their tracks?

Options:

A.  

ISA proxy

B.  

IAS proxy

C.  

TOR proxy

D.  

Cheops proxy

Discussion 0
Question # 108

E-mail tracking is a method to monitor and spy the delivered e-mails to the intended recipient.

Question # 108

Select a feature, which you will NOT be able to accomplish with this probe?

Options:

A.  

When the e-mail was received and read

B.  

Send destructive e-mails

C.  

GPS location and map of the recipient

D.  

Time spent on reading the e-mails

E.  

Whether or not the recipient visited any links sent to them

F.  

Track PDF and other types of attachments

G.  

Set messages to expire after specified time

Discussion 0
Question # 109

ViruXine.W32 virus hides their presence by changing the underlying executable code. This Virus code mutates while keeping the original algorithm intact, the code changes itself each time it runs, but the function of the code (its semantics) will not change at all.

Question # 109

Here is a section of the Virus code:

Question # 109

What is this technique called?

Options:

A.  

Polymorphic Virus

B.  

Metamorphic Virus

C.  

Dravidic Virus

D.  

Stealth Virus

Discussion 0
Question # 110

Harold works for Jacobson Unlimited in the IT department as the security manager. Harold has created a security policy requiring all employees to use complex 14 character passwords. Unfortunately, the members of management do not want to have to use such long complicated passwords so they tell Harold's boss this new password policy should not apply to them. To comply with the management's wishes, the IT department creates another Windows domain and moves all the management users to that domain. This new domain has a password policy only requiring 8 characters.

Harold is concerned about having to accommodate the managers, but cannot do anything about it. Harold is also concerned about using LanManager security on his network instead of NTLM or NTLMv2, but the many legacy applications on the network prevent using the more secure NTLM and NTLMv2. Harold pulls the SAM files from the DC's on the original domain and the new domain using Pwdump6.

Harold uses the password cracking software John the Ripper to crack users' passwords to make sure they are strong enough. Harold expects that the users' passwords in the original domain will take much longer to crack than the management's passwords in the new domain. After running the software, Harold discovers that the 14 character passwords only took a short time longer to crack than the 8 character passwords.

Why did the 14 character passwords not take much longer to crack than the 8 character passwords?

Options:

A.  

Harold should have used Dumpsec instead of Pwdump6

B.  

Harold's dictionary file was not large enough

C.  

Harold should use LC4 instead of John the Ripper

D.  

LanManger hashes are broken up into two 7 character fields

Discussion 0
Get EC0-350 dumps and pass your exam in 24 hours!

Free Exams Sample Questions