Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

EC0-350 Ethical Hacking and Countermeasures V8 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

EC0-350 Practice Questions

Ethical Hacking and Countermeasures V8

Last Update 1 day ago
Total Questions : 878

Dive into our fully updated and stable EC0-350 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about EC0-350. Use this test to pinpoint which areas you need to focus your study on.

EC0-350 PDF

EC0-350 PDF (Printable)
$43.75
$124.99

EC0-350 Testing Engine

EC0-350 PDF (Printable)
$50.75
$144.99

EC0-350 PDF + Testing Engine

EC0-350 PDF (Printable)
$63.7
$181.99
Question # 11

This tool is widely used for ARP Poisoning attack. Name the tool.

Question # 11

Options:

A.  

Cain and Able

B.  

Beat Infector

C.  

Poison Ivy

D.  

Webarp Infector

Discussion 0
Question # 12

Attackers target HINFO record types stored on a DNS server to enumerate information. These are information records and potential source for reconnaissance. A network administrator has the option of entering host information specifically the CPU type and operating system when creating a new DNS record. An attacker can extract this type of information easily from a DNS server.

Which of the following commands extracts the HINFO record?

Question # 12

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 13

What type of Trojan is this?

Question # 13

Options:

A.  

RAT Trojan

B.  

E-Mail Trojan

C.  

Defacement Trojan

D.  

Destructing Trojan

E.  

Denial of Service Trojan

Discussion 0
Question # 14

TCP SYN Flood attack uses the three-way handshake mechanism.

1. An attacker at system A sends a SYN packet to victim at system

B.  

2. System B sends a SYN/ACK packet to victim

A.  

3. As a normal three-way handshake mechanism system A should send an ACK packet to system B, however, system A does not send an ACK packet to system

B.  

In this case client B is waiting for an ACK packet from client

A.  

This status of client B is called _________________

Options:

A.  

"half-closed"

B.  

"half open"

C.  

"full-open"

D.  

"xmas-open"

Discussion 0
Question # 15

A common technique for luring e-mail users into opening virus-launching attachments is to send messages that would appear to be relevant or important to many of their potential recipients. One way of accomplishing this feat is to make the virus-carrying messages appear to come from some type of business entity retailing sites, UPS, FEDEX, CITIBANK or a major provider of a common service.

Here is a fraudulent e-mail claiming to be from FedEx regarding a package that could not be delivered. This mail asks the receiver to open an attachment in order to obtain the FEDEX tracking number for picking up the package. The attachment contained in this type of e-mail activates a virus.

Question # 15

Vendors send e-mails like this to their customers advising them not to open any files attached with the mail, as they do not include attachments.

Fraudulent e-mail and legit e-mail that arrives in your inbox contain the fedex.com as the sender of the mail.

How do you ensure if the e-mail is authentic and sent from fedex.com?

Options:

A.  

Verify the digital signature attached with the mail, the fake mail will not have Digital ID at all

B.  

Check the Sender ID against the National Spam Database (NSD)

C.  

Fake mail will have spelling/grammatical errors

D.  

Fake mail uses extensive images, animation and flash content

Discussion 0
Question # 16

What is the correct command to run Netcat on a server using port 56 that spawns command shell when connected?

Question # 16

Options:

A.  

nc -port 56 -s cmd.exe

B.  

nc -p 56 -p -e shell.exe

C.  

nc -r 56 -c cmd.exe

D.  

nc -L 56 -t -e cmd.exe

Discussion 0
Question # 17

Samuel is the network administrator of DataX Communications, Inc. He is trying to configure his firewall to block password brute force attempts on his network. He enables blocking the intruder's IP address for a period of 24 hours' time after more than three unsuccessful attempts. He is confident that this rule will secure his network from hackers on the Internet.

But he still receives hundreds of thousands brute-force attempts generated from various IP addresses around the world. After some investigation he realizes that the intruders are using a proxy somewhere else on the Internet which has been scripted to enable the random usage of various proxies on each request so as not to get caught by the firewall rule.

Later he adds another rule to his firewall and enables small sleep on the password attempt so that if the password is incorrect, it would take 45 seconds to return to the user to begin another attempt. Since an intruder may use multiple machines to brute force the password, he also throttles the number of connections that will be prepared to accept from a particular IP address. This action will slow the intruder's attempts.

Samuel wants to completely block hackers brute force attempts on his network.

What are the alternatives to defending against possible brute-force password attacks on his site?

Options:

A.  

Enforce a password policy and use account lockouts after three wrong logon attempts even though this might lock out legit users

B.  

Enable the IDS to monitor the intrusion attempts and alert you by e-mail about the IP address of the intruder so that you can block them at the

Firewall manually

C.  

Enforce complex password policy on your network so that passwords are more difficult to brute force

D.  

You cannot completely block the intruders attempt if they constantly switch proxies

Discussion 0
Question # 18

Oregon Corp is fighting a litigation suit with Scamster Inc. Oregon has assigned a private investigative agency to go through garbage, recycled paper, and other rubbish at Scamster's office site in order to find relevant information. What would you call this kind of activity?

Options:

A.  

CI Gathering

B.  

Scanning

C.  

Dumpster Diving

D.  

Garbage Scooping

Discussion 0
Question # 19

You are trying to package a RAT Trojan so that Anti-Virus software will not detect it. Which of the listed technique will NOT be effective in evading Anti-Virus scanner?

Options:

A.  

Convert the Trojan.exe file extension to Trojan.txt disguising as text file

B.  

Break the Trojan into multiple smaller files and zip the individual pieces

C.  

Change the content of the Trojan using hex editor and modify the checksum

D.  

Encrypt the Trojan using multiple hashing algorithms like MD5 and SHA-1

Discussion 0
Question # 20

Which of the following techniques can be used to mitigate the risk of an on-site attacker from connecting to an unused network port and gaining full access to the network? (Choose three.)

Options:

A.  

Port Security

B.  

IPSec Encryption

C.  

Network Admission Control (NAC)

D.  

802.1q Port Based Authentication

E.  

802.1x Port Based Authentication

F.  

Intrusion Detection System (IDS)

Discussion 0
Get EC0-350 dumps and pass your exam in 24 hours!

Free Exams Sample Questions