New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free ECCouncil EC0-350 Practice Exam with Questions & Answers | Set: 8

Questions 141

Which of the following is an example of two factor authentication?

Options:
A.

PIN Number and Birth Date

B.

Username and Password

C.

Digital Certificate and Hardware Token

D.

Fingerprint and Smartcard ID

ECCouncil EC0-350 Premium Access
Questions 142

Smart cards use which protocol to transfer the certificate in a secure manner?

Options:
A.

Extensible Authentication Protocol (EAP)

B.

Point to Point Protocol (PPP)

C.

Point to Point Tunneling Protocol (PPTP)

D.

Layer 2 Tunneling Protocol (L2TP)

Questions 143

In keeping with the best practices of layered security, where are the best places to place intrusion detection/intrusion prevention systems? (Choose two.)

Options:
A.

HID/HIP (Host-based Intrusion Detection/Host-based Intrusion Prevention)

B.

NID/NIP (Node-based Intrusion Detection/Node-based Intrusion Prevention)

C.

NID/NIP (Network-based Intrusion Detection/Network-based Intrusion Prevention)

D.

CID/CIP (Computer-based Intrusion Detection/Computer-based Intrusion Prevention)

Questions 144

To send a PGP encrypted message, which piece of information from the recipient must the sender have before encrypting the message?

Options:
A.

Recipient's private key

B.

Recipient's public key

C.

Master encryption key

D.

Sender's public key

Questions 145

A penetration tester is conducting a port scan on a specific host. The tester found several ports opened that were confusing in concluding the Operating System (OS) version installed. Considering the NMAP result below, which of the following is likely to be installed on the target machine by the OS?

Starting NMAP 5.21 at 2011-03-15 11:06

NMAP scan report for 172.16.40.65

Host is up (1.00s latency).

Not shown: 993 closed ports

PORT STATE SERVICE

21/tcp open ftp

23/tcp open telnet

80/tcp open http

139/tcp open netbios-ssn

515/tcp open

631/tcp open  ipp

9100/tcp open

MAC Address: 00:00:48:0D:EE:89

Options:
A.

The host is likely a Windows machine.

B.

The host is likely a Linux machine.

C.

The host is likely a router.

D.

The host is likely a printer.

Questions 146

When creating a security program, which approach would be used if senior management is supporting and enforcing the security policy?

Options:
A.

A bottom-up approach

B.

A top-down approach

C.

A senior creation approach

D.

An IT assurance approach

Questions 147

Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a 32-bit address to a 48-bit address?

Options:
A.

ICPM

B.

ARP

C.

RARP

D.

ICMP

Questions 148

Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process.  Which of the following is the correct bit size of the Diffie-Hellman (DH) group 5?

Options:
A.

768 bit key

B.

1025 bit key

C.

1536 bit key

D.

2048 bit key

Questions 149

The use of technologies like IPSec can help guarantee the followinG. authenticity, integrity, confidentiality and

Options:
A.

non-repudiation.

B.

operability.

C.

security.

D.

usability.

Questions 150

Which results will be returned with the following Google search query?

site:target.com -site:Marketing.target.com accounting

Options:
A.

Results matching all words in the query

B.

Results matching “accounting” in domain target.com but not on the site Marketing.target.com

C.

Results from matches on the site marketing.target.com that are in the domain target.com but do not include the word accounting

D.

Results for matches on target.com and Marketing.target.com that include the word “accounting”

Questions 151

A circuit level gateway works at which of the following layers of the OSI Model?

Options:
A.

 Layer 5 - Application

B.

Layer 4 – TCP

C.

Layer 3 – Internet protocol

D.

Layer 2 – Data link

Questions 152

Which of the following programs is usually targeted at Microsoft Office products?

Options:
A.

Polymorphic virus

B.

Multipart virus

C.

Macro virus

D.

Stealth virus

Questions 153

When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?

Options:
A.

Network tap

B.

Layer 3 switch

C.

Network bridge

D.

Application firewall

Questions 154

What is the main difference between a “Normal” SQL Injection and a “Blind” SQL Injection vulnerability?

Options:
A.

The request to the web server is not visible to the administrator of the vulnerable application.

B.

The attack is called “Blind” because, although the application properly filters user input, it is still vulnerable to code injection.

C.

The successful attack does not show an error message to the administrator of the affected application.

D.

The vulnerable application does not display errors with information about the injection results to the attacker.

Questions 155

An attacker has captured a target file that is encrypted with public key cryptography. Which of the attacks below is likely to be used to crack the target file?

Options:
A.

Timing attack

B.

Replay attack

C.

Memory trade-off attack

D.

Chosen plain-text attack

Questions 156

How does an operating system protect the passwords used for account logins?

Options:
A.

The operating system performs a one-way hash of the passwords.

B.

The operating system stores the passwords in a secret file that users cannot find.

C.

The operating system encrypts the passwords, and decrypts them when needed.

D.

The operating system stores all passwords in a protected segment of non-volatile memory.

Questions 157

A corporation hired an ethical hacker to test if it is possible to obtain users' login credentials using methods other than social engineering. Access to offices and to a network node is granted.  Results from server scanning indicate all are adequately patched and physical access is denied, thus, administrators have access only through Remote Desktop. Which technique could be used to obtain login credentials?

Options:
A.

Capture every users' traffic with Ettercap.

B.

Capture LANMAN Hashes and crack them with LC6.

C.

Guess passwords using Medusa or Hydra against a network service.

D.

Capture administrators RDP traffic and decode it with Cain and Abel.

Questions 158

Which type of security document is written with specific step-by-step details?

Options:
A.

Process

B.

Procedure

C.

Policy

D.

Paradigm

Questions 159

Which of the following processes of PKI (Public Key Infrastructure) ensures that a trust relationship exists and that a certificate is still valid for specific operations?

Options:
A.

Certificate issuance

B.

Certificate validation

C.

Certificate cryptography

D.

Certificate revocation

Questions 160

When comparing the testing methodologies of Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM) the main difference is

Options:
A.

OWASP is for web applications and OSSTMM does not include web applications.

B.

OSSTMM is gray box testing and OWASP is black box testing.

C.

OWASP addresses controls and OSSTMM does not.

D.

OSSTMM addresses controls and OWASP does not.