Discount Offer
Go Back on EC0-350 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

EC0-350 Practice Test

Whether you're a beginner or brushing up on skills, our EC0-350 practice exam is your key to success. Our comprehensive question bank covers all key topics, ensuring you’re fully prepared.


Page 8 out of 175 Pages

Topic 1: Volume A

Anonymizer sites access the Internet on your behalf, protecting your personal information
from disclosure. An anonymizer protects all of your computer's identifying information while
it surfs for you, enabling you to remain at least one step removed from the sites you visit.
You can visit Web sites without allowing anyone to gather information on sites visited by
you. Services that provide anonymity disable pop-up windows and cookies, and conceal
visitor's IP address.
These services typically use a proxy server to process each HTTP request. When the user
requests a Web page by clicking a hyperlink or typing a URL into their browser, the service
retrieves and displays the information using its own server. The remote server (where the requested Web page resides) receives information on the anonymous Web surfing service
in place of your information.
In which situations would you want to use anonymizer? (Select 3 answers)


A.

Increase your Web browsing bandwidth speed by using Anonymizer


B.

To protect your privacy and Identity on the Internet


C.

To bypass blocking applications that would prevent access to Web sites or parts of sites
that you want to visit


D.

Post negative entries in blogs without revealing your IP identity





B.
  

To protect your privacy and Identity on the Internet



C.
  

To bypass blocking applications that would prevent access to Web sites or parts of sites
that you want to visit



D.
  

Post negative entries in blogs without revealing your IP identity



This tool is widely used for ARP Poisoning attack. Name the tool.


A.

Cain and Able


B.

Beat Infector


C.

Poison Ivy


D.

Webarp Infector





A.
  

Cain and Able



You just purchased the latest DELL computer, which comes pre-installed with Windows 7,
McAfee antivirus software and a host of other applications. You want to connect Ethernet
wire to your cable modem and start using the computer immediately. Windows is
dangerously insecure when unpacked from the box, and there are a few things that you
must do before you use it.


A.

New installation of Windows should be patched by installing the latest service packs and
hotfixes


B.

Key applications such as Adobe Acrobat, Macromedia Flash, Java, Winzip etc., must
have the latest security patches installed


C.

Install a personal firewall and lock down unused ports from connecting to your computer


D.

Install the latest signatures for Antivirus software


E.

Configure "Windows Update" to automatic


F.

Create a non-admin user with a complex password and logon to this account


G.

You can start using your computer as vendors such as DELL, HP and IBM would have
already installed the latest service packs.





A.
  

New installation of Windows should be patched by installing the latest service packs and
hotfixes



C.
  

Install a personal firewall and lock down unused ports from connecting to your computer



D.
  

Install the latest signatures for Antivirus software



E.
  

Configure "Windows Update" to automatic



F.
  

Create a non-admin user with a complex password and logon to this account



This attack uses social engineering techniques to trick users into accessing a fake Web site
and divulging personal information. Attackers send a legitimate-looking e-mail asking users
to update their information on the company's Web site, but the URLs in the e-mail actually
point to a false Web site


A.

Wiresharp attack


B.

Switch and bait attack


C.

Phishing attack


D.

Man-in-the-Middle attack





C.
  

Phishing attack



Which of the following type of scanning utilizes automated process of proactively identifying
vulnerabilities of the computing systems present on a network?


A.

Port Scanning


B.

Single Scanning


C.

External Scanning


D.

Vulnerability Scanning





D.
  

Vulnerability Scanning




Page 8 out of 175 Pages
Previous