Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ECCouncil Certified Ethical Hacker EC0-350 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam EC0-350 Premium Access

View all detail and faqs for the EC0-350 exam


330 Students Passed

92% Average Score

93% Same Questions
Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions
Questions # 1:

Bill has successfully executed a buffer overflow against a Windows IIS web server. He has been able to spawn an interactive shell and plans to deface the main web page. He first attempts to use the “Echo” command to simply overwrite index.html and remains unsuccessful. He then attempts to delete the page and achieves no progress. Finally, he tries to overwrite it with another page again in vain.

What is the probable cause of Bill’s problem?

Options:

A.

The system is a honeypot.

B.

There is a problem with the shell and he needs to run the attack again.

C.

You cannot use a buffer overflow to deface a web page.

D.

The HTML file has permissions of ready only.

Questions # 2:

Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is being followed here?

Options:

A.

no authentication

B.

single key authentication

C.

shared key authentication

D.

open system authentication

Questions # 3:

Melissa is a virus that attacks Microsoft Windows platforms.

To which category does this virus belong?

Options:

A.

Polymorphic

B.

Boot Sector infector

C.

System

D.

Macro

Questions # 4:

Peter is a Network Admin. He is concerned that his network is vulnerable to a smurf attack. What should Peter do to prevent a smurf attack?

Select the best answer.

Options:

A.

He should disable unicast on all routers

B.

Disable multicast on the router

C.

Turn off fragmentation on his router

D.

Make sure all anti-virus protection is updated on all systems

E.

Make sure his router won't take a directed broadcast

Questions # 5:

Exhibit

Question # 5

Study the log given in the exhibit,

Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate?

Options:

A.

Disallow UDP 53 in from outside to DNS server

B.

Allow UDP 53 in from DNS server to outside

C.

Disallow TCP 53 in form secondaries or ISP server to DNS server

D.

Block all UDP traffic

Questions # 6:

You have successfully run a buffer overflow attack against a default IIS installation running on a Windows 2000 Server. The server allows you to spawn a shell. In order to perform the actions you intend to do, you need elevated permission. You need to know what your current privileges are within the shell. Which of the following options would be your current privileges?

Options:

A.

Administrator

B.

IUSR_COMPUTERNAME

C.

LOCAL_SYSTEM

D.

Whatever account IIS was installed with

Questions # 7:

All the web servers in the DMZ respond to ACK scan on port 80. Why is this happening ?

Options:

A.

They are all Windows based webserver

B.

They are all Unix based webserver

C.

The company is not using IDS

D.

The company is not using a stateful firewall

Questions # 8:

Which of the following snort rules look for FTP root login attempts?

Options:

A.

alert tcp -> any port 21 (msg:"user root";)

B.

alert tcp -> any port 21 (message:"user root";)

C.

alert ftp -> ftp (content:"user password root";)

D.

alert tcp any any -> any any 21 (content:"user root";)

Questions # 9:

Which are true statements concerning the BugBear and Pretty Park worms?

Select the best answers.

Options:

A.

Both programs use email to do their work.

B.

Pretty Park propagates via network shares and email

C.

BugBear propagates via network shares and email

D.

Pretty Park tries to connect to an IRC server to send your personal passwords.

E.

Pretty Park can terminate anti-virus applications that might be running to bypass them.

Questions # 10:

What do you call a system where users need to remember only one username and password, and be authenticated for multiple services?

Options:

A.

Simple Sign-on

B.

Unique Sign-on

C.

Single Sign-on

D.

Digital Certificate

Questions # 11:

ETHER: Destination address : 0000BA5EBA11 ETHER: Source address :

Question # 11

An employee wants to defeat detection by a network-based IDS application. He does not want to attack the system containing the IDS application. Which of the following strategies can be used to defeat detection by a network-based IDS application?

Options:

A.

Create a SYN flood

B.

Create a network tunnel

C.

Create multiple false positives

D.

Create a ping flood

Questions # 12:

On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks?

Options:

A.

The SSID is only 32 bits in length.

B.

The SSID is transmitted in clear text.

C.

The SSID is the same as the MAC address for all vendors.

D.

The SSID is to identify a station, not a network.

Questions # 13:

During the intelligence gathering phase of a penetration test, you come across a press release by a security products vendor stating that they have signed a multi-million dollar agreement with the company you are targeting. The contract was for vulnerability assessment tools and network based IDS systems. While researching on that particular brand of IDS you notice that its default installation allows it to perform sniffing and attack analysis on one NIC and caters to its management and reporting on another NIC. The sniffing interface is completely unbound from the TCP/IP stack by default. Assuming the defaults were used, how can you detect these sniffing interfaces?

Options:

A.

Use a ping flood against the IP of the sniffing NIC and look for latency in the responses.

B.

Send your attack traffic and look for it to be dropped by the IDS.

C.

Set your IP to that of the IDS and look for it as it attempts to knock your computer off the network.

D.

The sniffing interface cannot be detected.

Questions # 14:

Steven the hacker realizes that the network administrator of XYZ is using syskey to protect organization resources in the Windows 2000 Server. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to brute force dictionary attacks on the hashes. Steven runs a program called “SysCracker” targeting the Windows 2000 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch attach.

How many bits does Syskey use for encryption?

Options:

A.

40 bit

B.

64 bit

C.

256 bit

D.

128 bit

Questions # 15:

There is some dispute between two network administrators at your company. Your boss asks you to come and meet with the administrators to set the record straight. Which of these are true about PKI and encryption?

Select the best answers.

Options:

A.

PKI provides data with encryption, compression, and restorability.

B.

Public-key encryption was invented in 1976 by Whitfield Diffie and Martin Hellman.

C.

When it comes to eCommerce, as long as you have authenticity, and authenticity, you do not need encryption.

D.

RSA is a type of encryption.

Questions # 16:

You have been called to investigate a sudden increase in network traffic at XYZ. It seems that the traffic generated was too heavy that normal business functions could no longer be rendered to external employees and clients. After a quick investigation, you find that the computer has services running attached to TFN2k and Trinoo software. What do you think was the most likely cause behind this sudden increase in traffic?

Options:

A.

A distributed denial of service attack.

B.

A network card that was jabbering.

C.

A bad route on the firewall.

D.

Invalid rules entry at the gateway.

Questions # 17:

Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?

Options:

A.

There is no mutual authentication between wireless clients and access points

B.

Automated tools like AirSnort are available to discover WEP keys

C.

The standard does not provide for centralized key management

D.

The 24 bit Initialization Vector (IV) field is too small

Questions # 18:

Symmetric encryption algorithms are known to be fast but present great challenges on the key management side. Asymmetric encryption algorithms are slow but allow communication with a remote host without having to transfer a key out of band or in person. If we combine the strength of both crypto systems where we use the symmetric algorithm to encrypt the bulk of the data and then use the asymmetric encryption system to encrypt the symmetric key, what would this type of usage be known as?

Options:

A.

Symmetric system

B.

Combined system

C.

Hybrid system

D.

Asymmetric system

Questions # 19:

Why would an ethical hacker use the technique of firewalking?

Options:

A.

It is a technique used to discover wireless network on foot.

B.

It is a technique used to map routers on a network link.

C.

It is a technique used to discover the nature of rules configured on a gateway.

D.

It is a technique used to discover interfaces in promiscuous mode.

Questions # 20:

Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call such a host?

Options:

A.

Honeypot

B.

DMZ host

C.

DWZ host

D.

Bastion Host

Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.