Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

EC0-350 ECCouncil Ethical Hacking and Countermeasures V8 Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ECCouncil EC0-350 Ethical Hacking and Countermeasures V8 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 6 / 7
Total 878 questions

Peter is a Network Admin. He is concerned that his network is vulnerable to a smurf attack. What should Peter do to prevent a smurf attack?

Select the best answer.

A.

He should disable unicast on all routers

B.

Disable multicast on the router

C.

Turn off fragmentation on his router

D.

Make sure all anti-virus protection is updated on all systems

E.

Make sure his router won't take a directed broadcast

Which of the following is most effective against passwords?

Select the Answer:

A.

Dictionary Attack

B.

BruteForce attack

C.

Targeted Attack

D.

Manual password Attack

On a backdoored Linux box there is a possibility that legitimate programs are modified or trojaned. How is it possible to list processes and uids associated with them in a more reliable manner?

A.

Use "Is"

B.

Use "lsof"

C.

Use "echo"

D.

Use "netstat"

____________ will let you assume a users identity at a dynamically generated web page or site.

A.

SQL attack

B.

Injection attack

C.

Cross site scripting

D.

The shell attack

E.

Winzapper

Exhibit:

You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anuthing or 1=1-“ in the username filed of an authentication form. This is the output returned from the server.

What is the next step you should do?

A.

Identify the user context of the web application by running_

http://www.example.com/order/include_rsa_asp?pressReleaseID=5

AND

USER_NAME() = ‘dbo’

B.

Identify the database and table name by running:

http://www.example.com/order/include_rsa.asp?pressReleaseID=5

AND

ascii(lower(substring((SELECT TOP 1 name FROM sysobjects WHERE

xtype=’U’), 1))) > 109

C.

Format the C: drive and delete the database by running:

http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND

xp_cmdshell ‘format c: /q /yes ‘; drop database myDB; --

D.

Reboot the web server by running:

http://www.example.com/order/include_rsa.asp?pressReleaseID=5

AND xp_cmdshell ‘iisreset –reboot’; --

To scan a host downstream from a security gateway, Firewalking:

A.

Sends a UDP-based packet that it knows will be blocked by the firewall to determine how specifically the firewall responds to such packets

B.

Uses the TTL function to send packets with a TTL value set to expire one hop past the identified security gateway

C.

Sends an ICMP ''administratively prohibited'' packet to determine if the gateway will drop the packet without comment.

D.

Assesses the security rules that relate to the target system before it sends packets to any hops on the route to the gateway

Which of the following wireless technologies can be detected by NetStumbler? (Select all that apply)

A.

802.11b

B.

802.11e

C.

802.11a

D.

802.11g

E.

802.11

This kind of attack will let you assume a users identity at a dynamically generated web page or site:

A.

SQL Injection

B.

Cross Site Scripting

C.

Session Hijacking

D.

Zone Transfer

You have performed the traceroute below and notice that hops 19 and 20 both show the same IP address.

What can be inferred from this output?

A.

An application proxy firewall

B.

A stateful inspection firewall

C.

A host based IDS

D.

A Honeypot

Windump is the windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform you must install a packet capture library.

What is the name of this library?

A.

NTPCAP

B.

LibPCAP

C.

WinPCAP

D.

PCAP

Rebecca is a security analyst and knows of a local root exploit that has the ability to enable local users to use available exploits to gain root privileges. This vulnerability exploits a condition in the Linux kernel within the execve() system call. There is no known workaround that exists for this vulnerability. What is the correct action to be taken by Rebecca in this situation as a recommendation to management?

A.

Rebecca should make a recommendation to disable the () system call

B.

Rebecca should make a recommendation to upgrade the Linux kernel promptly

C.

Rebecca should make a recommendation to set all child-process to sleep within the execve()

D.

Rebecca should make a recommendation to hire more system administrators to monitor all child processes to ensure that each child process can't elevate privilege

Rebecca has noted multiple entries in her logs about users attempting to connect on ports that are either not opened or ports that are not for public usage. How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?

A.

Ensure all files have at least a 755 or more restrictive permissions.

B.

Configure rules using ipchains.

C.

Configure and enable portsentry on his server.

D.

Install an intrusion detection system on her computer such as Snort.

What is a sheepdip?

A.

It is another name for Honeynet

B.

It is a machine used to coordinate honeynets

C.

It is the process of checking physical media for virus before they are used in a computer

D.

None of the above

Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?

A.

All IVs are vulnerable to attack

B.

Air Snort uses a cache of packets

C.

Air Snort implements the FMS attack and only encrypted packets are counted

D.

A majority of weak IVs transmitted by access points and wireless cards are not filtered by contemporary wireless manufacturers

Neil is closely monitoring his firewall rules and logs on a regular basis. Some of the users have complained to Neil that there are a few employees who are visiting offensive web site during work hours, without any consideration for others. Neil knows that he has an up-to-date content filtering system and such access should not be authorized. What type of technique might be used by these offenders to access the Internet without restriction?

A.

They are using UDP that is always authorized at the firewall

B.

They are using an older version of Internet Explorer that allow them to bypass the proxy server

C.

They have been able to compromise the firewall, modify the rules, and give themselves proper access

D.

They are using tunneling software that allows them to communicate with protocols in a way it was not intended

Which of the following best describes session key creation in SSL?

A.

It is created by the server after verifying theuser's identity

B.

It is created by the server upon connection by the client

C.

It is created by the client from the server's public key

D.

It is created by the client after verifying the server's identity

RC4 is known to be a good stream generator. RC4 is used within the WEP standard on wireless LAN. WEP is known to be insecure even if we are using a stream cipher that is known to be secured.

What is the most likely cause behind this?

A.

There are some flaws in the implementation.

B.

There is no key management.

C.

The IV range is too small.

D.

All of the above.

E.

None of the above.

Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend?

Select the best answer.

A.

Ipchains

B.

Iptables

C.

Checkpoint FW for Linux

D.

Ipfwadm

Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call such a host?

A.

Honeypot

B.

DMZ host

C.

DWZ host

D.

Bastion Host

What is Hunt used for?

A.

Hunt is used to footprint networks

B.

Hunt is used to sniff traffic

C.

Hunt is used to hack web servers

D.

Hunt is used to intercept traffic i.e. man-in-the-middle traffic

E.

Hunt is used for password cracking

There are two types of honeypots- high and low interaction. Which of these describes a low interaction honeypot? Select the best answers.

A.

Emulators of vulnerable programs

B.

More likely to be penetrated

C.

Easier to deploy and maintain

D.

Tend to be used for production

E.

More detectable

F.

Tend to be used for research

What is the name of the software tool used to crack a single account on Netware Servers using a dictionary attack?

A.

NPWCrack

B.

NWPCrack

C.

NovCrack

D.

CrackNov

E.

GetCrack

A Buffer Overflow attack involves:

A.

Using a trojan program to direct data traffic to the target host's memory stack

B.

Flooding the target network buffers with data traffic to reduce the bandwidth available to legitimate users

C.

Using a dictionary to crack password buffers by guessing user names and passwords

D.

Poorly written software that allows an attacker to execute arbitrary code on a target system

Bubba has just accessed he preferred ecommerce web site and has spotted an item that he would like to buy. Bubba considers the price a bit too steep. He looks at the source code of the webpage and decides to save the page locally, so that he can modify the page variables. In the context of web application security, what do you think Bubba has changes?

A.

A hidden form field value.

B.

A hidden price value.

C.

An integer variable.

D.

A page cannot be changed locally, as it is served by a web server.

Virus Scrubbers and other malware detection program can only detect items that they are aware of. Which of the following tools would allow you to detect unauthorized changes or modifications of binary files on your system by unknown malware?

A.

System integrity verification tools

B.

Anti-Virus Software

C.

A properly configured gateway

D.

There is no way of finding out until a new updated signature file is released

Statistics from cert.org and other leading security organizations has clearly showed a steady rise in the number of hacking incidents perpetrated against companies.

What do you think is the main reason behind the significant increase in hacking attempts over the past years?

A.

It is getting more challenging and harder to hack for non technical people.

B.

There is a phenomenal increase in processing power.

C.

New TCP/IP stack features are constantly being added.

D.

The ease with which hacker tools are available on the Internet.

Look at the following SQL query.

SELECT * FROM product WHERE PCategory='computers' or 1=1--'

What will it return? Select the best answer.

A.

All computers and all 1's

B.

All computers

C.

All computers and everything else

D.

Everything except computers

Most NIDS systems operate in layer 2 of the OSI model. These systems feed raw traffic into a detection engine and rely on the pattern matching and/or statistical analysis to determine what is malicious. Packets are not processed by the host's TCP/IP stack allowing the NIDS to analyze traffic the host would otherwise discard. Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NIDS systems, while still being correctly assembled by the host TCP/IP stack to render the attack payload?

A.

Defrag

B.

Tcpfrag

C.

Tcpdump

D.

Fragroute

John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John's network, which of the following options is he likely to choose?

A.

Use ClosedVPN

B.

Use Monkey shell

C.

Use reverse shell using FTP protocol

D.

Use HTTPTunnel or Stunnel on port 80 and 443

Ivan is auditing a corporate website. Using Winhex, he alters a cookie as shown below.

Before Alteration: Cookie: lang=en-us; ADMIN=no; y=1 ; time=10:30GMT ;

After Alteration: Cookie: lang=en-us; ADMIN=yes; y=1 ; time=12:30GMT ;

What attack is being depicted here?

A.

Cookie Stealing

B.

Session Hijacking

C.

Cross Site Scripting

D.

Parameter Manipulation

Bob is a very security conscious computer user. He plans to test a site that is known to have malicious applets, code, and more. Bob always make use of a basic Web Browser to perform such testing.

Which of the following web browser can adequately fill this purpose?

A.

Internet Explorer

B.

Mozila

C.

Lynx

D.

Tiger

What is GINA?

A.

Gateway Interface Network Application

B.

GUI Installed Network Application CLASS

C.

Global Internet National Authority (G-USA)

D.

Graphical Identification and Authentication DLL

Fingerprinting an Operating System helps a cracker because:

A.

It defines exactly what software you have installed

B.

It opens a security-delayed window based on the port being scanned

C.

It doesn't depend on the patches that have been applied to fix existing security holes

D.

It informs the cracker of which vulnerabilities he may be able to exploit on your system

Which of the following LM hashes represent a password of less than 8 characters? (Select 2)

A.

BA810DBA98995F1817306D272A9441BB

B.

44EFCE164AB921CQAAD3B435B51404EE

C.

0182BD0BD4444BF836077A718CCDF409

D.

CEC52EB9C8E3455DC2265B23734E0DAC

E.

B757BF5C0D87772FAAD3B435B51404EE

F.

E52CAC67419A9A224A3B108F3FA6CB6D

Which DNS resource record can indicate how long any "DNS poisoning" could last?

A.

MX

B.

SOA

C.

NS

D.

TIMEOUT

Which of the following is the primary objective of a rootkit?

A.

It opens a port to provide an unauthorized service

B.

It creates a buffer overflow

C.

It replaces legitimate programs

D.

It provides an undocumented opening in a program

Exhibit:

The following is an entry captured by a network IDS.You are assigned the task of analyzing this entry. You notice the value 0x90, which is the most common NOOP instruction for the Intel processor. You figure that the attacker is attempting a buffer overflow attack. You also notice "/bin/sh" in the ASCII part of the output. As an analyst what would you conclude about the attack?

A.

The buffer overflow attack has been neutralized by the IDS

B.

The attacker is creating a directory on the compromised machine

C.

The attacker is attempting a buffer overflow attack and has succeeded

D.

The attacker is attempting an exploit that launches a command-line shell

The follows is an email header. What address is that of the true originator of the message?

A.

19.25.19.10

B.

51.32.123.21

C.

168.150.84.123

D.

215.52.220.122

E.

8.10.2/8.10.2

Which of the following display filters will you enable in Ethereal to view the three-way handshake for a connection from host 192.168.0.1?

A.

ip == 192.168.0.1 and tcp.syn

B.

ip.addr = 192.168.0.1 and syn = 1

C.

ip.addr==192.168.0.1 and tcp.flags.syn

D.

ip.equals 192.168.0.1 and syn.equals on

What file system vulnerability does the following command take advantage of?

type c:\anyfile.exe > c:\winnt\system32\calc.exe:anyfile.exe

A.

HFS

B.

ADS

C.

NTFS

D.

Backdoor access

Page: 6 / 7
Total 878 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved