Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Last Attempt EC0-350 Questions

Page: 21 / 32
Question 84

John is using a special tool on his Linux platform that has a signature database and is therefore able to detect hundred of vulnerabilities in UNIX, Windows, and commonly-used web CGI scripts. Additionally, the database detects DDoS zombies and Trojans. What would be the name of this multifunctional tool?

Options:

A.

nmap

B.

hping

C.

nessus

D.

make

Question 85

Your XYZ trainee Sandra asks you which are the four existing Regional Internet Registry (RIR's)?

Options:

A.

APNIC, PICNIC, ARIN, LACNIC

B.

RIPE NCC, LACNIC, ARIN, APNIC

C.

RIPE NCC, NANIC, ARIN, APNIC

D.

RIPE NCC, ARIN, APNIC, LATNIC

Question 86

Which type of scan does NOT open a full TCP connection?

Options:

A.

Stealth Scan

B.

XMAS Scan

C.

Null Scan

D.

FIN Scan

Question 87

Web servers often contain directories that do not need to be indexed. You create a text file with search engine indexing restrictions and place it on the root directory of the Web Server.

User-agent: *

Disallow: /images/

Disallow: /banners/

Disallow: /Forms/

Disallow: /Dictionary/

Disallow: /_borders/

Disallow: /_fpclass/

Disallow: /_overlay/

Disallow: /_private/

Disallow: /_themes/

What is the name of this file?

Options:

A.

robots.txt

B.

search.txt

C.

blocklist.txt

D.

spf.txt

Page: 21 / 32
Exam Code: EC0-350
Exam Name: Ethical Hacking and Countermeasures V8
Last Update: May 15, 2024
Questions: 878
EC0-350 pdf

EC0-350 PDF

$28  $80
EC0-350 Engine

EC0-350 Testing Engine

$33.25  $95
EC0-350 PDF + Engine

EC0-350 PDF + Testing Engine

$45.5  $130