New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

EC0-350 Exam Dumps - Ethical Hacking and Countermeasures V8

Go to page:
Question # 81

Which of the following statements best describes the term Vulnerability?

A.

A weakness or error that can lead to a compromise

B.

An agent that has the potential to take advantage of a weakness

C.

An action or event that might prejudice security

D.

The loss potential of a threat.

Full Access
Question # 82

802.11b is considered a ____________ protocol.

A.

Connectionless

B.

Secure

C.

Unsecure

D.

Token ring based

E.

Unreliable

Full Access
Question # 83

Clive has been hired to perform a Black-Box test by one of his clients.

How much information will Clive obtain from the client before commencing his test?

A.

IP Range, OS, and patches installed.

B.

Only the IP address range.

C.

Nothing but corporate name.

D.

All that is available from the client site.

Full Access
Question # 84

Which are true statements concerning the BugBear and Pretty Park worms?

Select the best answers.

A.

Both programs use email to do their work.

B.

Pretty Park propagates via network shares and email

C.

BugBear propagates via network shares and email

D.

Pretty Park tries to connect to an IRC server to send your personal passwords.

E.

Pretty Park can terminate anti-virus applications that might be running to bypass them.

Full Access
Question # 85

Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?

A.

Use any ARP requests found in the capture

B.

Derek can use a session replay on the packets captured

C.

Derek can use KisMAC as it needs two USB devices to generate traffic

D.

Use Ettercap to discover the gateway and ICMP ping flood tool to generate traffic

Full Access
Question # 86

What is the tool Firewalk used for?

A.

To test the IDS for proper operation

B.

To test a firewall for proper operation

C.

To determine what rules are in place for a firewall

D.

To test the webserver configuration

E.

Firewalk is a firewall auto configuration tool

Full Access
Question # 87

Kevin has been asked to write a short program to gather user input for a web application. He likes to keep his code neat and simple. He chooses to use printf(str) where he should have ideally used printf(?s? str). What attack will his program expose the web application to?

A.

Cross Site Scripting

B.

SQL injection Attack

C.

Format String Attack

D.

Unicode Traversal Attack

Full Access
Question # 88

How would you prevent session hijacking attacks?

A.

Using biometrics access tokens secures sessions against hijacking

B.

Using non-Internet protocols like http secures sessions against hijacking

C.

Using hardware-based authentication secures sessions against hijacking

D.

Using unpredictable sequence numbers secures sessions against hijacking

Full Access
Go to page: