Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

ECCouncil EC0-350 Actual Questions

Page: 29 / 32
Question 116

During the intelligence gathering phase of a penetration test, you come across a press release by a security products vendor stating that they have signed a multi-million dollar agreement with the company you are targeting. The contract was for vulnerability assessment tools and network based IDS systems. While researching on that particular brand of IDS you notice that its default installation allows it to perform sniffing and attack analysis on one NIC and caters to its management and reporting on another NIC. The sniffing interface is completely unbound from the TCP/IP stack by default. Assuming the defaults were used, how can you detect these sniffing interfaces?

Options:

A.

Use a ping flood against the IP of the sniffing NIC and look for latency in the responses.

B.

Send your attack traffic and look for it to be dropped by the IDS.

C.

Set your IP to that of the IDS and look for it as it attempts to knock your computer off the network.

D.

The sniffing interface cannot be detected.

Question 117

Eve decides to get her hands dirty and tries out a Denial of Service attack that is relatively new to her. This time she envisages using a different kind of method to attack Brownies Inc. Eve tries to forge the packets and uses the broadcast address. She launches an attack similar to that of fraggle. What is the technique that Eve used in the case above?

Options:

A.

Smurf

B.

Bubonic

C.

SYN Flood

D.

Ping of Death

Question 118

In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob’s public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message.

Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob’s public key and use it to verify Bob’s signature, they cannot discover Bob’s private key and use it to forge digital signatures.

What does this principle refer to?

Options:

A.

Irreversibility

B.

Non-repudiation

C.

Symmetry

D.

Asymmetry

Question 119

Bob is a very security conscious computer user. He plans to test a site that is known to have malicious applets, code, and more. Bob always make use of a basic Web Browser to perform such testing.

Which of the following web browser can adequately fill this purpose?

Options:

A.

Internet Explorer

B.

Mozila

C.

Lynx

D.

Tiger

Page: 29 / 32
Exam Code: EC0-350
Exam Name: Ethical Hacking and Countermeasures V8
Last Update: May 15, 2024
Questions: 878
EC0-350 pdf

EC0-350 PDF

$28  $80
EC0-350 Engine

EC0-350 Testing Engine

$33.25  $95
EC0-350 PDF + Engine

EC0-350 PDF + Testing Engine

$45.5  $130