EC-COUNCIL Ethical hacking and countermeasures - EC0-350 Exam Practice Test

Exhibit:

Given the following extract from the snort log on a honeypot, what service is being exploited? :
Correct Answer: D Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
What is the proper response for a NULL scan if the port is closed?
Correct Answer: A Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
Which of the following tools are used for enumeration? (Choose three.)
Correct Answer: C,D,E Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
In Trojan terminology, what is a covert channel?
Correct Answer: D Vote an answer
Peter is a Linux network admin. As a knowledgeable security consultant, he turns to you to look for help on a firewall. He wants to use Linux as his firewall and use the latest freely available version that is offered. What do you recommend?
Select the best answer.
Correct Answer: C Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a good security mechanism to protect a wireless networks?
Correct Answer: B Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
You are the CIO for Avantes Finance International, a global finance company based in Geneva. You are responsible for network functions and logical security throughout the entire corporation. Your company has over 250 servers running Windows Server, 5000 workstations running Windows Vista, and 200 mobile users working from laptops on Windows 7.
Last week, 10 of your company's laptops were stolen from salesmen while at a conference in Amsterdam. These laptops contained proprietary company information. While doing damage assessment on the possible public relations nightmare this may become, a news story leaks about the stolen laptops and also that sensitive information from those computers was posted to a blog online.
What built-in Windows feature could you have implemented to protect the sensitive information on these laptops?
Correct Answer: C Vote an answer
Which of the following techniques does a vulnerability scanner use in order to detect a vulnerability on a target service?
Correct Answer: D Vote an answer
Neil is closely monitoring his firewall rules and logs on a regular basis. Some of the users have complained to Neil that there are a few employees who are visiting offensive web site during work hours, without any consideration for others. Neil knows that he has an up-to-date content filtering system and such access should not be authorized. What type of technique might be used by these offenders to access the Internet without restriction?
Correct Answer: A Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
What is the following command used for?
net use \targetipc$ "" /u:""
Correct Answer: E Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
What tool can crack Windows SMB passwords simply by listening to network traffic?
Select the best answer.
Correct Answer: B Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
Which of the following are password cracking tools? (Choose three.)
Correct Answer: B,D,F Vote an answer
_________ is one of the programs used to wardial.
Correct Answer: E Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
ICMP ping and ping sweeps are used to check for active systems and to check
Correct Answer: A Vote an answer
Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
Correct Answer: B Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).
In which location, SAM hash passwords are stored in Windows 7?
Correct Answer: C Vote an answer
You have performed the traceroute below and notice that hops 19 and 20 both show the same IP address.
What can be inferred from this output?
Correct Answer: D Vote an answer
Peter, a Network Administrator, has come to you looking for advice on a tool that would help him perform SNMP enquires over the network. Which of these tools would do the SNMP enumeration he is looking for?
Select the best answers.
Correct Answer: A,B,C Vote an answer
Explanation: Only visible for PassTestking members. You can sign-up / login (it's free).