ECCouncil EC0-350 - Ethical Hacking and Countermeasures V8
Which of the following is considered an acceptable option when managing a risk?
What two things will happen if a router receives an ICMP packet, which has a TTL value of 1, and the destination host is several hops away? (Select 2 answers)
Doug is conducting a port scan of a target network. He knows that his client target network has a web server and that there is a mail server also which is up and running. Doug has been sweeping the network but has not been able to elicit any response from the remote target. Which of the following could be the most likely cause behind this lack of response? Select 4.
What does a type 3 code 13 represent?(Choose two.
When Nmap performs a ping sweep, which of the following sets of requests does it send to the target device?
Destination unreachable administratively prohibited messages can inform the hacker to what?
You are conducting a port scan on a subnet that has ICMP blocked. You have discovered 23 live systems and after scanning each of them you notice that they all show port 21 in closed state.
What should be the next logical step that should be performed?
John is using a special tool on his Linux platform that has a signature database and is therefore able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts. Additionally, the database detects DDoS zombies and Trojans. What would be the name of this multifunctional tool?
Name two software tools used for OS guessing? (Choose two.
What is the essential difference between an ‘Ethical Hacker’ and a ‘Cracker’?
While performing ping scans into a target network you get a frantic call from the organization’s security team. They report that they are under a denial of service attack. When you stop your scan, the smurf attack event stops showing up on the organization’s IDS monitor. How can you modify your scan to prevent triggering this event in the IDS?
Because UDP is a connectionless protocol: (Select 2)
The use of technologies like IPSec can help guarantee the followinG. authenticity, integrity, confidentiality and
International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by outlining
The fundamental difference between symmetric and asymmetric key cryptographic systems is that symmetric key cryptography uses which of the following?
A bank stores and processes sensitive privacy information related to home loans. However, auditing has never been enabled on the system. What is the first step that the bank should take before enabling the audit feature?
Which of the following lists are valid data-gathering activities associated with a risk assessment?
A security policy will be more accepted by employees if it is consistent and has the support of
Windows file servers commonly hold sensitive files, databases, passwords and more. Which of the following choices would be a common vulnerability that usually exposes them?
Which initial procedure should an ethical hacker perform after being brought into an organization? Â