Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

EC0-350 Ethical Hacking and Countermeasures V8 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

EC0-350 Practice Questions

Ethical Hacking and Countermeasures V8

Last Update 1 day ago
Total Questions : 878

Dive into our fully updated and stable EC0-350 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about EC0-350. Use this test to pinpoint which areas you need to focus your study on.

EC0-350 PDF

EC0-350 PDF (Printable)
$43.75
$124.99

EC0-350 Testing Engine

EC0-350 PDF (Printable)
$50.75
$144.99

EC0-350 PDF + Testing Engine

EC0-350 PDF (Printable)
$63.7
$181.99
Question # 51

Which DNS resource record can indicate how long any "DNS poisoning" could last?

Options:

A.  

MX

B.  

SOA

C.  

NS

D.  

TIMEOUT

Discussion 0
Question # 52

Network Administrator Patricia is doing an audit of the network. Below are some of her findings concerning DNS. Which of these would be a cause for alarm?

Select the best answer.

Options:

A.  

There are two external DNS Servers for Internet domains. Both are AD integrated.

B.  

All external DNS is done by an ISP.

C.  

Internal AD Integrated DNS servers are using private DNS names that are

D.  

unregistered.

E.  

Private IP addresses are used on the internal network and are registered with the internal AD integrated DNS server.

Discussion 0
Question # 53

You receive an email with the following message:

Hello Steve,

We are having technical difficulty in restoring user database record after the recent blackout. Your account data is corrupted. Please logon to the SuperEmailServices.com and change your password.

http://www.supermailservices.com@0xde.0xad.0xbe.0xef/support/logon.htm

If you do not reset your password within 7 days, your account will be permanently disabled locking you out from our e-mail services.

Sincerely,

Technical Support

SuperEmailServices

From this e-mail you suspect that this message was sent by some hacker since you have been using their e-mail services for the last 2 years and they have never sent out an e-mail such as this. You also observe the URL in the message and confirm your suspicion about 0xde.0xad.0xbde.0xef which looks like hexadecimal numbers. You immediately enter the following at Windows 2000 command prompt:

Ping 0xde.0xad.0xbe.0xef

You get a response with a valid IP address.

What is the obstructed IP address in the e-mail URL?

Options:

A.  

222.173.190.239

B.  

233.34.45.64

C.  

54.23.56.55

D.  

199.223.23.45

Discussion 0
Question # 54

Which of the following is optimized for confidential communications, such as bidirectional voice and video?

Options:

A.  

RC4

B.  

RC5

C.  

MD4

D.  

MD5

Discussion 0
Question # 55

__________ is found in all versions of NTFS and is described as the ability to fork file data into existing files without affecting their functionality, size, or display to traditional file browsing utilities like dir or Windows Explorer

Options:

A.  

Alternate Data Streams

B.  

Merge Streams

C.  

Steganography

D.  

NetBIOS vulnerability

Discussion 0
Question # 56

Your lab partner is trying to find out more information about a competitors web site. The site has a .com extension. She has decided to use some online whois tools and look in one of the regional Internet registrys. Which one would you suggest she looks in first?

Options:

A.  

LACNIC

B.  

ARIN

C.  

APNIC

D.  

RIPE

E.  

AfriNIC

Discussion 0
Question # 57

A XYZ security System Administrator is reviewing the network system log files.

He notes the following:

  • Network log files are at 5 MB at 12:00 noon.
  • At 14:00 hours, the log files at 3 M

    B.  

What should he assume has happened and what should he do about the situation?

Options:

A.  

He should contact the attacker’s ISP as soon as possible and have the connection disconnected.

B.  

He should log the event as suspicious activity, continue to investigate, and take further steps according to site security policy.

C.  

He should log the file size, and archive the information, because the router crashed.

D.  

He should run a file system check, because the Syslog server has a self correcting file system problem.

E.  

He should disconnect from the Internet discontinue any further unauthorized use, because an attack has taken place.

Discussion 0
Question # 58

Which of the following systems would not respond correctly to an nmap XMAS scan?

Options:

A.  

Windows 2000 Server running IIS 5

B.  

Any Solaris version running SAMBA Server

C.  

Any version of IRIX

D.  

RedHat Linux 8.0 running Apache Web Server

Discussion 0
Question # 59

Which of the following is an automated vulnerability assessment tool?

Options:

A.  

Whack a Mole

B.  

Nmap

C.  

Nessus

D.  

Kismet

E.  

Jill32

Discussion 0
Question # 60

The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces which of the following vulnerabilities?

Options:

A.  

An attacker, working slowly enough, can evade detection by the IDS.

B.  

Network packets are dropped if the volume exceeds the threshold.

C.  

Thresholding interferes with the IDS’ ability to reassemble fragmented packets.

D.  

The IDS will not distinguish among packets originating from different sources.

Discussion 0
Get EC0-350 dumps and pass your exam in 24 hours!

Free Exams Sample Questions