ECCouncil EC0-350 - Ethical Hacking and Countermeasures V8 Exam
Page: 2 / 176
Total 878 questions
Question #6 (Topic: Topic 1)
This type of Port Scanning technique splits TCP header into several packets so that the
packet filters are not able to detect what the packets intends to do.
packet filters are not able to detect what the packets intends to do.
A. UDP Scanning
B. IP Fragment Scanning
C. Inverse TCP flag scanning
D. ACK flag scanning
Answer: B
Question #7 (Topic: Topic 1)
Jake works as a system administrator at Acme Corp. Jason, an accountant of the firm
befriends him at the canteen and tags along with him on the pretext of appraising him
about potential tax benefits. Jason waits for Jake to swipe his access card and follows him
through the open door into the secure systems area. How would you describe Jason's
behavior within a security context?
befriends him at the canteen and tags along with him on the pretext of appraising him
about potential tax benefits. Jason waits for Jake to swipe his access card and follows him
through the open door into the secure systems area. How would you describe Jason's
behavior within a security context?
A. Smooth Talking
B. Swipe Gating
C. Tailgating
D. Trailing
Answer: C
Question #8 (Topic: Topic 1)
Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer
on his network that will receive a copy of every packet that passes through the main office
switch. What type of port will Neil need to setup in order to accomplish this?
on his network that will receive a copy of every packet that passes through the main office
switch. What type of port will Neil need to setup in order to accomplish this?
A. Neil will have to configure a Bridged port that will copy all packets to the protocol analyzer.
B. Neil will need to setup SPAN port that will copy all network traffic to the protocol analyzer.
C. He will have to setup an Ether channel port to get a copy of all network traffic to the analyzer.
D. He should setup a MODS port which will copy all network traffic.
Answer: B
Question #9 (Topic: Topic 1)
Syslog is a standard for logging program messages. It allows separation of the software
that generates messages from the system that stores them and the software that reports
and analyzes them. It also provides devices, which would otherwise be unable to
communicate a means to notify administrators of problems or performance.
[ECCouncil-EC0-350-5.1/ECCouncil-EC0-350-7_2.png]
What default port Syslog daemon listens on?
that generates messages from the system that stores them and the software that reports
and analyzes them. It also provides devices, which would otherwise be unable to
communicate a means to notify administrators of problems or performance.
[ECCouncil-EC0-350-5.1/ECCouncil-EC0-350-7_2.png]
What default port Syslog daemon listens on?
A. 242
B. 312
C. 416
D. 514
Answer: D
Question #10 (Topic: Topic 1)
Anonymizer sites access the Internet on your behalf, protecting your personal information
from disclosure. An anonymizer protects all of your computer's identifying information while
it surfs for you, enabling you to remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by
you. Services that provide anonymity disable pop-up windows and cookies, and conceal
visitor's IP address.
These services typically use a proxy server to process each HTTP request. When the user
requests a Web page by clicking a hyperlink or typing a URL into their browser, the service
retrieves and displays the information using its own server. The remote server (where the
requested Web page resides) receives information on the anonymous Web surfing service
in place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)
from disclosure. An anonymizer protects all of your computer's identifying information while
it surfs for you, enabling you to remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by
you. Services that provide anonymity disable pop-up windows and cookies, and conceal
visitor's IP address.
These services typically use a proxy server to process each HTTP request. When the user
requests a Web page by clicking a hyperlink or typing a URL into their browser, the service
retrieves and displays the information using its own server. The remote server (where the
requested Web page resides) receives information on the anonymous Web surfing service
in place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)
A. Increase your Web browsing bandwidth speed by using Anonymizer
B. To protect your privacy and Identity on the Internet
C. To bypass blocking applications that would prevent access to Web sites or parts of sites that you want to visit.
D. Post negative entries in blogs without revealing your IP identity
Answer: B,C,D