Home / ECCouncil / CEH Certified Ethical Hacker Exams / EC0-350 - Ethical Hacking and Countermeasures V8

Latest EC0-350 Exam Questions


Question # 1



Several of your co-workers are having a discussion over the etc/passwd file. They are at
odds over what types of encryption are used to secure Linux passwords.(Choose all that
apply.

A.

Linux passwords can be encrypted with MD5

B.

Linux passwords can be encrypted with SHA

C.

Linux passwords can be encrypted with DES

D.

Linux passwords can be encrypted with Blowfish

E.

Linux passwords are encrypted with asymmetric algrothims




A.
  

Linux passwords can be encrypted with MD5




C.
  

Linux passwords can be encrypted with DES




D.
  

Linux passwords can be encrypted with Blowfish



Linux passwords are enrcypted using MD5, DES, and the NEW addition
Blowfish. The default on most linux systems is dependant on the distribution, RedHat uses
MD5, while slackware uses DES. The blowfish option is there for those who wish to use it.
The encryption algorithm in use can be determined by authconfig on RedHat-based
systems, or by reviewing one of two locations, on PAM-based systems (Pluggable
Authentication Module) it can be found in /etc/pam.d/, the system-auth file or authconfig
files. In other systems it can be found in /etc/security/ directory.





Question # 2



How would you prevent session hijacking attacks?

A.

Using biometrics access tokens secures sessions against hijacking

B.

Using non-Internet protocols like http secures sessions against hijacking

C.

Using hardware-based authentication secures sessions against hijacking

D.

Using unpredictable sequence numbers secures sessions against hijacking




D.
  

Using unpredictable sequence numbers secures sessions against hijacking



Protection of a session needs to focus on the unique session identifier
because it is the only thing that distinguishes users. If the session ID is compromised,
attackers can impersonate other users on the system. The first thing is to ensure that the
sequence of identification numbers issued by the session management system is
unpredictable; otherwise, it's trivial to hijack another user's session. Having a large number
of possible session IDs (meaning that they should be very long) means that there are a lot
more permutations for an attacker to try.





Question # 3



Henry is an attacker and wants to gain control of a system and use it to flood a target
system with requests, so as to prevent legitimate users from gaining access. What type of
attack is Henry using?

A.

Henry is executing commands or viewing data outside the intended target path

B.

Henry is using a denial of service attack which is a valid threat used by an attacker

C.

Henry is taking advantage of an incorrect configuration that leads to access with higherthan-
expected privilege

D.

Henry uses poorly designed input validation routines to create or alter commands to
gain access to unintended data or execute commands




B.
  

Henry is using a denial of service attack which is a valid threat used by an attacker



Henry’s intention is to perform a DoS attack against his target, possibly a
DDoS attack. He uses systems other than his own to perform the attack in order to cover
the tracks back to him and to get more “punch” in the DoS attack if he uses multiple
systems.





Question # 4



Exhibit:

Given the following extract from the snort log on a honeypot, what do you infer from the
attack?

A.

A new port was opened

B.

A new user id was created

C.

The exploit was successful

D.

The exploit was not successful




D.
  

The exploit was not successful



The attacker submits a PASS to the honeypot and receives a login incorrect
before disconnecting.





Question # 5



Which of the following snort rules look for FTP root login attempts?

A.

alert tcp -> any port 21 (msg:"user root";)

C.

alert ftp -> ftp (content:"user password root";)

D.

alert tcp any any -> any any 21 (content:"user root";)




D.
  

alert tcp any any -> any any 21 (content:"user root";)



The snort rule header is built by defining action (alert), protocol (tcp), from IP
subnet port (any any), to IP subnet port (any any 21), Payload Detection Rule Options
(content:”user root”;)





Question # 6



Scanning for services is an easy job for Bob as there are so many tools available from the
Internet. In order for him to check the vulnerability of XYZ, he went through a few scanners
that are currently available. Here are the scanners that he uses:
1. Axent’s NetRecon (http://www.axent.com)
2. SARA, by Advanced Research Organization (http://www-arc.com/sara)
3. VLAD the Scanner, by Razor (http://razor.bindview.com/tools/)
However, there are many other alternative ways to make sure that the services that have
been scanned will be more accurate and detailed for Bob.
What would be the best method to accurately identify the services running on a victim
host?

A.

Using Cheops-ng to identify the devices of XYZ.

B.

Using the manual method of telnet to each of the open ports of XYZ.

C.

Using a vulnerability scanner to try to probe each port to verify or figure out which
service is running for XYZ.

D.

Using the default port and OS to make a best guess of what services are running on
each port for XYZ.




B.
  

Using the manual method of telnet to each of the open ports of XYZ.







Question # 7



You want to carry out session hijacking on a remote server. The server and the client are
communicating via TCP after a successful TCP three way handshake. The server has just
received packet #120 from the client. The client has a receive window of 200 and the
server has a receive window of 250.
Within what range of sequence numbers should a packet, sent by the client fall in order to
be accepted by the server?

A.

200-250

B.

121-371

C.

120-321

D.

121-231

E.

120-370




B.
  

121-371



Package number 120 have already been received by the server and the
window is 250 packets, so any package number from 121 (next in sequence) to 371 (121+250).





Question # 8



A buffer overflow occurs when a program or process tries to store more data in a buffer
(temporary data storage area) then it was intended to hold.
What is the most common cause of buffer overflow in software today?

A.

Bad permissions on files

B.

High bandwidth and large number of users.

C.

Usage of non standard programming languages.

D.

Bad quality assurance on software produced.




D.
  

Bad quality assurance on software produced.



Technically, a buffer overflow is a problem with the program's internal
implementation.





Question # 9



Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station
responds by encrypting the plaintext. It then transmits the resulting ciphertext using the
same key and cipher that are used by WEP to encrypt subsequent network traffic. What
authentication mechanism is being followed here?

A.

no authentication

B.

single key authentication

C.

shared key authentication

D.

open system authentication




C.
  

shared key authentication







Question # 10



Network Intrusion Detection systems can monitor traffic in real time on networks.
Which one of the following techniques can be very effective at avoiding proper detection?

A.

Fragmentation of packets

B.

Use of only TCP based protocols

C.

Use of only UDP based protocols

D.

Use of fragmented ICMP traffic only




A.
  

Fragmentation of packets



If the default fragmentation reassembly timeout is set to higher on the client
than on the IDS then the it is possible to send an attack in fragments that will never be
reassembled in the IDS but they will be reassembled and read on the client computer
acting victim.




Get 878 Ethical Hacking and Countermeasures V8 questions Access in less then $0.12 per day.

Total Questions Answers: 878
Last Updated: 25-Oct-2024
Available with 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $64

Test Engine: $20 $80

PDF + Engine: $25 $99


ECCouncil EC0-350 Dumps - Real Exam Questions


Exam Code: EC0-350
Exam Name: Ethical Hacking and Countermeasures V8

  • 90 Days Free Updates
  • ECCouncil Experts Verified Answers
  • Printable PDF File Format
  • EC0-350 Exam Passing Assurance

Get 100% Real EC0-350 Exam Dumps With Verified Answers As Seen in the Real Exam. Ethical Hacking and Countermeasures V8 Exam Questions are Updated Frequently and Reviewed by Industry TOP Experts for Passing CEH Certified Ethical Hacker Exams Exam Quickly and Hassle Free.

CEH Certified Ethical Hacker Exams Exams
ECCouncil 312-50 Exam Dumps

ECCouncil EC0-350 Dumps


Struggling with Ethical Hacking and Countermeasures V8 prep? Get the edge you need!

Our carefully created EC0-350 dumps give you the confidence to pass the exam. We offer:

  • Up-to-date CEH Certified Ethical Hacker Exams practice questions: Stay current with the latest exam content.
  • PDF and test engine formats: Choose the study tools that work best for you.
  • Realistic ECCouncil EC0-350 practice exam: Simulate the real exam experience and boost your readiness.
Pass your CEH Certified Ethical Hacker Exams exam with ease. Try our study materials today!


Ace your CEH Certified Ethical Hacker Exams exam with confidence!

We provide top-quality EC0-350 exam dumps materials that are:
  • Accurate and up-to-date: Reflect the latest ECCouncil exam changes and ensure you are studying the right content. 
  • Comprehensive: Cover all exam topics so you do not need to rely on multiple sources. 
  • Convenient formats: Choose between PDF files and online Ethical Hacking and Countermeasures V8 practice test for easy studying on any device.
Do not waste time on unreliable EC0-350 practice test. Choose our proven CEH Certified Ethical Hacker Exams study materials and pass with flying colors.

Try Dumps4free Ethical Hacking and Countermeasures V8 2024 PDFs today!

  • Assurance

    Ethical Hacking and Countermeasures V8 practice exam has been updated to reflect the most recent questions from the ECCouncil EC0-350 Exam.

  • Demo

    Try before you buy! Get a free demo of our CEH Certified Ethical Hacker Exams exam dumps and see the quality for yourself. Need help? Chat with our support team.

  • Validity

    Our ECCouncil EC0-350 PDF contains expert-verified questions and answers, ensuring you're studying the most accurate and relevant material.

  • Success

    Achieve EC0-350 success! Our Ethical Hacking and Countermeasures V8 exam questions give you the preparation edge.

If you have any question then contact our customer support at live chat or email us at support@dumps4free.com.