Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

EC0-350 Ethical Hacking and Countermeasures V8 is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

EC0-350 Practice Questions

Ethical Hacking and Countermeasures V8

Last Update 1 day ago
Total Questions : 878

Dive into our fully updated and stable EC0-350 practice test platform, featuring all the latest Certified Ethical Hacker exam questions added this week. Our preparation tool is more than just a ECCouncil study aid; it's a strategic advantage.

Our free Certified Ethical Hacker practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about EC0-350. Use this test to pinpoint which areas you need to focus your study on.

EC0-350 PDF

EC0-350 PDF (Printable)
$43.75
$124.99

EC0-350 Testing Engine

EC0-350 PDF (Printable)
$50.75
$144.99

EC0-350 PDF + Testing Engine

EC0-350 PDF (Printable)
$63.7
$181.99
Question # 61

What are two types of ICMP code used when using the ping command?

Options:

A.  

It uses types 0 and 8.

B.  

It uses types 13 and 14.

C.  

It uses types 15 and 17.

D.  

The ping command does not use ICMP but uses UDP.

Discussion 0
Question # 62

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.

Which of the following features makes this possible? (Choose two)

Options:

A.  

It used TCP as the underlying protocol.

B.  

It uses community string that is transmitted in clear text.

C.  

It is susceptible to sniffing.

D.  

It is used by all network devices on the market.

Discussion 0
Question # 63

You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live systems and after scanning each of them you notice that they all show port 21 in closed state.

What should be the next logical step that should be performed?

Options:

A.  

Connect to open ports to discover applications.

B.  

Perform a ping sweep to identify any additional systems that might be up.

C.  

Perform a SYN scan on port 21 to identify any additional systems that might be up.

D.  

Rescan every computer to verify the results.

Discussion 0
Question # 64

While footprinting a network, what port/service should you look for to attempt a zone transfer?

Options:

A.  

53 UDP

B.  

53 TCP

C.  

25 UDP

D.  

25 TCP

E.  

161 UDP

F.  

22 TCP

G.  

60 TCP

Discussion 0
Question # 65

Exhibit

Question # 65

Joe Hacker runs the hping2 hacking tool to predict the target host’s sequence numbers in one of the hacking session.

What does the first and second column mean? Select two.

Options:

A.  

The first column reports the sequence number

B.  

The second column reports the difference between the current and last sequence number

C.  

The second column reports the next sequence number

D.  

The first column reports the difference between current and last sequence number

Discussion 0
Question # 66

What is "Hacktivism"?

Options:

A.  

Hacking for a cause

B.  

Hacking ruthlessly

C.  

An association which groups activists

D.  

None of the above

Discussion 0
Question # 67

NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish?

nslookup

> server

> set type =any

> ls -d

Options:

A.  

Enables DNS spoofing

B.  

Loads bogus entries into the DNS table

C.  

Verifies zone security

D.  

Performs a zone transfer

E.  

Resets the DNS cache

Discussion 0
Question # 68

You are having problems while retrieving results after performing port scanning during internal testing. You verify that there are no security devices between you and the target system. When both stealth and connect scanning do not work, you decide to perform a NULL scan with NMAP. The first few systems scanned shows all ports open.

Which one of the following statements is probably true?

Options:

A.  

The systems have all ports open.

B.  

The systems are running a host based IDS.

C.  

The systems are web servers.

D.  

The systems are running Windows.

Discussion 0
Question # 69

Which type of security document is written with specific step-by-step details?

Options:

A.  

Process

B.  

Procedure

C.  

Policy

D.  

Paradigm

Discussion 0
Question # 70

When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?

Options:

A.  

A bottom-up approach

B.  

A top-down approach

C.  

A senior creation approach

D.  

An IT assurance approach

Discussion 0
Get EC0-350 dumps and pass your exam in 24 hours!

Free Exams Sample Questions