Discount Offer
Go Back on EC0-350 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

EC0-350 Practice Test

Whether you're a beginner or brushing up on skills, our EC0-350 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 4 out of 175 Pages

Topic 1: Volume A

What does ICMP (type 11, code 0) denote?


A.

Source Quench


B.

Destination Unreachable


C.

Time Exceeded


D.

Unknown Type





C.
  

Time Exceeded



If a competitor wants to cause damage to your organization, steal critical secrets, or put you out of business, they just have to find a job opening, prepare someone to pass the interview, have that person hired, and they will be in the organization.

How would you prevent such type of attacks?


A.

It is impossible to block these attacks


B.

Hire the people through third-party job agencies who will vet them for you


C.

Conduct thorough background checks before you engage them


D.

Investigate their social networking profiles





C.
  

Conduct thorough background checks before you engage them



You receive an e-mail with the following text message.
"Microsoft and HP today warned all customers that a new, highly dangerous virus has been
discovered which will erase all your files at midnight. If there's a file called hidserv.exe on
your computer, you have been infected and your computer is now running a hidden server
that allows hackers to access your computer. Delete the file immediately. Please also pass
this message to all your friends and colleagues as soon as possible."
You launch your antivirus software and scan the suspicious looking file hidserv.exe located
in c:\windows directory and the AV comes out clean meaning the file is not infected. You
view the file signature and confirm that it is a legitimate Windows system file "Human
Interface Device Service".
What category of virus is this?


A.

Virus hoax


B.

Spooky Virus


C.

Stealth Virus


D.

Polymorphic Virus





A.
  

Virus hoax



What is War Dialing?


A.

War dialing involves the use of a program in conjunction with a modem to penetrate the
modem/PBX-based systems


B.

War dialing is a vulnerability scanning technique that penetrates Firewalls


C.

It is a social engineering technique that uses Phone calls to trick victims


D.

Involves IDS Scanning Fragments to bypass Internet filters and stateful Firewalls





A.
  

War dialing involves the use of a program in conjunction with a modem to penetrate the
modem/PBX-based systems



Peter extracts the SID list from Windows 2008 Server machine using the hacking tool
"SIDExtracter". Here is the output of the SIDs:

From the above list identify the user account with System Administrator privileges?


A.

John


B.

Rebecca


C.

Sheela


D.

Shawn


E.

Somia


F.

Chang


G.

Micah





F.
  

Chang




Page 4 out of 175 Pages
Previous