ECCouncil EC0-350 - Ethical Hacking and Countermeasures V8 Exam

Page:    1 / 176   
Total 878 questions

What port number is used by Kerberos protocol?

  • A. 88
  • B. 44
  • C. 487
  • D. 419


Answer : A

Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him ''just to double check our records.''
Jane does not suspect anything amiss, and parts with her password. Jack can now access
Brown Co.'s computers with a valid user name and password, to steal the cookie recipe.
What kind of attack is being illustrated here?

  • A. Reverse Psychology
  • B. Reverse Engineering
  • C. Social Engineering
  • D. Spoofing Identity
  • E. Faking Identity


Answer : C

Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?

  • A. Issue special cards to access secure doors at the company and provide a one-time only brief description of use of the special card
  • B. Educate and enforce physical security policies of the company to all the employees on a regular basis
  • C. Setup a mock video camera next to the special card reader adjacent to the secure door
  • D. Post a sign that states, "no tailgating" next to the special card reader adjacent to the secure door


Answer : B

A rootkit is a collection of tools (programs) that enable administrator-level access to a computer. This program hides itself deep into an operating system for malicious activity and is extremely difficult to detect. The malicious software operates in a stealth fashion by hiding its files, processes and registry keys and may be used to create a hidden directory or folder designed to keep out of view from a user's operating system and security software.


What privilege level does a rootkit require to infect successfully on a Victim's machine?

  • A. User level privileges
  • B. Ring 3 Privileges
  • C. System level privileges
  • D. Kernel level privileges


Answer : D

Ursula is a college student at a University in Amsterdam. Ursula originally went to college to study engineering but later changed to marine biology after spending a month at sea with her friends. These friends frequently go out to sea to follow and harass fishing fleets that illegally fish in foreign waters. Ursula eventually wants to put companies practicing illegal fishing out of business. Ursula decides to hack into the parent company's computers and destroy critical data knowing fully well that, if caught, she probably would be sent to jail for a very long time. What would Ursula be considered?

  • A. Ursula would be considered a gray hat since she is performing an act against illegal activities.
  • B. She would be considered a suicide hacker.
  • C. She would be called a cracker.
  • D. Ursula would be considered a black hat.


Answer : B

Page:    1 / 176   
Total 878 questions