Discount Offer
Go Back on EC0-350 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

EC0-350 Practice Test


Page 2 out of 175 Pages

Topic 1: Volume A

Which Steganography technique uses Whitespace to hide secret messages?


A.

snow


B.

beetle


C.

magnet


D.

cat





A.
  

snow



Attackers target HINFO record types stored on a DNS server to enumerate information.
These are information records and potential source for reconnaissance. A network
administrator has the option of entering host information specifically the CPU type and
operating system when creating a new DNS record. An attacker can extract this type of
information easily from a DNS server.
Which of the following commands extracts the HINFO record?


A.

Option A


B.

Option B


C.

Option C


D.

Option D





A.
  

Option A



Attackers footprint target Websites using Google Hacking techniques. Google hacking is a
term that refers to the art of creating complex search engine queries. It detects websites
that are vulnerable to numerous exploits and vulnerabilities. Google operators are used to
locate specific strings of text within the search results.
The configuration file contains both a username and a password for an SQL database.
Most sites with forums run a PHP message base. This file gives you the keys to that forum,
including FULL ADMIN access to the database. WordPress uses config.php that stores the database Username and Password. Which of the below Google search string brings up sites with "config.php" files?


A.

Search:index config/php


B.

Wordpress:index config.php


C.

intitle:index.of config.php


D.

Config.php:index list





C.
  

intitle:index.of config.php



What port number is used by Kerberos protocol?


A.

88


B.

44


C.

487


D.

419





A.
  

88



Vulnerability scanners are automated tools that are used to identify vulnerabilities and
misconfigurations of hosts. They also provide information regarding mitigating discovered
vulnerabilities.

Which of the following statements is incorrect?


A.

Vulnerability scanners attempt to identify vulnerabilities in the hosts scanned.


B.

Vulnerability scanners can help identify out-of-date software versions, missing patches,
or system upgrades


C.

They can validate compliance with or deviations from the organization's security policy


D.

Vulnerability scanners can identify weakness and automatically fix and patch the
vulnerabilities without user intervention





D.
  

Vulnerability scanners can identify weakness and automatically fix and patch the
vulnerabilities without user intervention




Page 2 out of 175 Pages
Previous