Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

EC0-350 Ethical Hacking and Countermeasures V8 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

EC0-350 Practice Questions

Ethical Hacking and Countermeasures V8

Last Update 1 day ago
Total Questions : 878

Dive into our fully updated and stable EC0-350 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about EC0-350. Use this test to pinpoint which areas you need to focus your study on.

EC0-350 PDF

EC0-350 PDF (Printable)
$43.75
$124.99

EC0-350 Testing Engine

EC0-350 PDF (Printable)
$50.75
$144.99

EC0-350 PDF + Testing Engine

EC0-350 PDF (Printable)
$63.7
$181.99
Question # 21

The traditional traceroute sends out ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached. By printing the gateways that generate ICMP time exceeded messages along the way, it is able to determine the path packets take to reach the destination.

The problem is that with the widespread use of firewalls on the Internet today, many of the packets that traceroute sends out end up being filtered, making it impossible to completely trace the path to the destination.

Question # 21

How would you overcome the Firewall restriction on ICMP ECHO packets?

Options:

A.  

Firewalls will permit inbound TCP packets to specific ports that hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.

B.  

Firewalls will permit inbound UDP packets to specific ports that hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.

C.  

Firewalls will permit inbound UDP packets to specific ports that hosts sitting behind the firewall are listening for connections. By sending out TCP SYN packets instead of ICMP ECHO packets, traceroute can bypass the most common firewall filters.

D.  

Do not use traceroute command to determine the path packets take to reach the destination instead use the custom hacking tool JOHNTHETRACER and run with the command

E.  

\> JOHNTHETRACER www.eccouncil.org -F -evade

Discussion 0
Question # 22

John runs a Web server, IDS and firewall on his network. Recently his Web server has been under constant hacking attacks. He looks up the IDS log files and sees no intrusion attempts but the Web server constantly locks up and needs rebooting due to various brute force and buffer overflow attacks but still the IDS alerts no intrusion whatsoever. John becomes suspicious and views the Firewall logs and he notices huge SSL connections constantly hitting his Web server. Hackers have been using the encrypted HTTPS protocol to send exploits to the Web server and that was the reason the IDS did not detect the intrusions. How would John protect his network from these types of attacks?

Options:

A.  

Install a proxy server and terminate SSL at the proxy

B.  

Enable the IDS to filter encrypted HTTPS traffic

C.  

Install a hardware SSL "accelerator" and terminate SSL at this layer

D.  

Enable the Firewall to filter encrypted HTTPS traffic

Discussion 0
Question # 23

What will the following command produce on a website's login page if executed successfully? SELECT email, passwd, login_id, full_name FROM members WHERE email = 'someone@somewhere.com'; DROP TABLE members; --'

Options:

A.  

This code will insert the someone@somewhere.com email address into the members table.

B.  

This command will delete the entire members table.

C.  

It retrieves the password for the first user in the members table.

D.  

This command will not produce anything since the syntax is incorrect.

Discussion 0
Question # 24

Simon is security analyst writing signatures for a Snort node he placed internally that captures all mirrored traffic from his border firewall. From the following signature, what will Snort look for in the payload of the suspected packets?

alert tcp $EXTERNAL_NET any -> $HOME_NET 27374 (ms

G.  

"BACKDOOR SIG - SubSseven 22";flags: A+; content: "|0d0a5b52504c5d3030320d0a|"; reference:arachnids, 485;) alert

Options:

A.  

The payload of 485 is what this Snort signature will look for.

B.  

Snort will look for 0d0a5b52504c5d3030320d0a in the payload.

C.  

Packets that contain the payload of BACKDOOR SIG - SubSseven 22 will be flagged.

D.  

From this snort signature, packets with HOME_NET 27374 in the payload will be flagged.

Discussion 0
Question # 25

Passive reconnaissance involves collecting information through which of the following?

Options:

A.  

Social engineering

B.  

Network traffic sniffing

C.  

Man in the middle attacks

D.  

Publicly accessible sources

Discussion 0
Question # 26

Here is the ASCII Sheet.

Question # 26

You want to guess the DBO username juggyboy (8 characters) using Blind SQL Injection technique.

What is the correct syntax?

Question # 26

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Question # 27

Jeremy is web security consultant for Information Securitas. Jeremy has just been hired to perform contract work for a large state agency in Michigan. Jeremy's first task is to scan all the company's external websites. Jeremy comes upon a login page which appears to allow employees access to sensitive areas on the website. James types in the following statement in the username field:

SELECT * from Users where username='admin' ?AND password='' AND email like '%@testers.com%'

What will the SQL statement accomplish?

Options:

A.  

If the page is susceptible to SQL injection, it will look in the Users table for usernames of admin

B.  

This statement will look for users with the name of admin, blank passwords, and email addresses that end in @testers.com

C.  

This Select SQL statement will log James in if there are any users with NULL passwords

D.  

James will be able to see if there are any default user accounts in the SQL database

Discussion 0
Question # 28

Which tool is used to automate SQL injections and exploit a database by forcing a given web application to connect to another database controlled by a hacker?

Options:

A.  

DataThief

B.  

NetCat

C.  

Cain and Abel

D.  

SQLInjector

Discussion 0
Question # 29

If an attacker's computer sends an IPID of 31400 to a zombie (Idle Scanning) computer on an open port, what will be the response?

Options:

A.  

31400

B.  

31402

C.  

The zombie will not send a response

D.  

31401

Discussion 0
Question # 30

An attacker is attempting to telnet into a corporation's system in the DMZ. The attacker doesn't want to get caught and is spoofing his IP address. After numerous tries he remains unsuccessful in connecting to the system. The attacker rechecks that the target system is actually listening on Port 23 and he verifies it with both nmap and hping2. He is still unable to connect to the target system. What could be the reason?

Options:

A.  

The firewall is blocking port 23 to that system

B.  

He needs to use an automated tool to telnet in

C.  

He cannot spoof his IP and successfully use TCP

D.  

He is attacking an operating system that does not reply to telnet even when open

Discussion 0
Get EC0-350 dumps and pass your exam in 24 hours!

Free Exams Sample Questions