ECCouncil EC0-350 - Ethical Hacking and Countermeasures V8 Exam
Page: 1 / 176
Total 878 questions
Question #1 (Topic: Topic 1)
What port number is used by Kerberos protocol?
A. 88
B. 44
C. 487
D. 419
Answer: A
Question #2 (Topic: Topic 1)
Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double
fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an
administrator from Brown Co. Jack tells Jane that there has been a problem with some
accounts and asks her to verify her password with him ''just to double check our records.''
Jane does not suspect anything amiss, and parts with her password. Jack can now access
Brown Co.'s computers with a valid user name and password, to steal the cookie recipe.
What kind of attack is being illustrated here?
fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an
administrator from Brown Co. Jack tells Jane that there has been a problem with some
accounts and asks her to verify her password with him ''just to double check our records.''
Jane does not suspect anything amiss, and parts with her password. Jack can now access
Brown Co.'s computers with a valid user name and password, to steal the cookie recipe.
What kind of attack is being illustrated here?
A. Reverse Psychology
B. Reverse Engineering
C. Social Engineering
D. Spoofing Identity
E. Faking Identity
Answer: C
Question #3 (Topic: Topic 1)
Bob waits near a secured door, holding a box. He waits until an employee walks up to the
secured door and uses the special card in order to access the restricted area of the target
company. Just as the employee opens the door, Bob walks up to the employee (still
holding the box) and asks the employee to hold the door open so that he can enter. What is
the best way to undermine the social engineering activity of tailgating?
secured door and uses the special card in order to access the restricted area of the target
company. Just as the employee opens the door, Bob walks up to the employee (still
holding the box) and asks the employee to hold the door open so that he can enter. What is
the best way to undermine the social engineering activity of tailgating?
A. Issue special cards to access secure doors at the company and provide a one-time only brief description of use of the special card
B. Educate and enforce physical security policies of the company to all the employees on a regular basis
C. Setup a mock video camera next to the special card reader adjacent to the secure door
D. Post a sign that states, "no tailgating" next to the special card reader adjacent to the secure door
Answer: B
Question #4 (Topic: Topic 1)
A rootkit is a collection of tools (programs) that enable administrator-level access to a
computer. This program hides itself deep into an operating system for malicious activity
and is extremely difficult to detect. The malicious software operates in a stealth fashion by
hiding its files, processes and registry keys and may be used to create a hidden directory
or folder designed to keep out of view from a user's operating system and security
software.
[ECCouncil-EC0-350-5.1/ECCouncil-EC0-350-4_2.png]
What privilege level does a rootkit require to infect successfully on a Victim's machine?
computer. This program hides itself deep into an operating system for malicious activity
and is extremely difficult to detect. The malicious software operates in a stealth fashion by
hiding its files, processes and registry keys and may be used to create a hidden directory
or folder designed to keep out of view from a user's operating system and security
software.
[ECCouncil-EC0-350-5.1/ECCouncil-EC0-350-4_2.png]
What privilege level does a rootkit require to infect successfully on a Victim's machine?
A. User level privileges
B. Ring 3 Privileges
C. System level privileges
D. Kernel level privileges
Answer: D
Question #5 (Topic: Topic 1)
Ursula is a college student at a University in Amsterdam. Ursula originally went to college
to study engineering but later changed to marine biology after spending a month at sea
with her friends. These friends frequently go out to sea to follow and harass fishing fleets
that illegally fish in foreign waters. Ursula eventually wants to put companies practicing
illegal fishing out of business. Ursula decides to hack into the parent company's computers
and destroy critical data knowing fully well that, if caught, she probably would be sent to jail
for a very long time. What would Ursula be considered?
to study engineering but later changed to marine biology after spending a month at sea
with her friends. These friends frequently go out to sea to follow and harass fishing fleets
that illegally fish in foreign waters. Ursula eventually wants to put companies practicing
illegal fishing out of business. Ursula decides to hack into the parent company's computers
and destroy critical data knowing fully well that, if caught, she probably would be sent to jail
for a very long time. What would Ursula be considered?
A. Ursula would be considered a gray hat since she is performing an act against illegal activities.
B. She would be considered a suicide hacker.
C. She would be called a cracker.
D. Ursula would be considered a black hat.
Answer: B