Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

ECCouncil Certified Ethical Hacker EC0-350 New Questions

Page: 27 / 32
Question 108

You have successfully run a buffer overflow attack against a default IIS installation running on a Windows 2000 Server. The server allows you to spawn a shell. In order to perform the actions you intend to do, you need elevated permission. You need to know what your current privileges are within the shell. Which of the following options would be your current privileges?

Options:

A.

Administrator

B.

IUSR_COMPUTERNAME

C.

LOCAL_SYSTEM

D.

Whatever account IIS was installed with

Question 109

Which of the following is not an effective countermeasure against replay attacks?

Options:

A.

Digital signatures

B.

Time Stamps

C.

System identification

D.

Sequence numbers

Question 110

What would best be defined as a security test on services against a known vulnerability database using an automated tool?

Options:

A.

A penetration test

B.

A privacy review

C.

A server audit

D.

A vulnerability assessment

Question 111

Sally is a network admin for a small company. She was asked to install wireless accesspoints in the building. In looking at the specifications for the access-points, she sees that all of them offer WEP. Which of these are true about WEP?

Select the best answer.

Options:

A.

Stands for Wireless Encryption Protocol

B.

It makes a WLAN as secure as a LAN

C.

Stands for Wired Equivalent Privacy

D.

It offers end to end security

Page: 27 / 32
Exam Code: EC0-350
Exam Name: Ethical Hacking and Countermeasures V8
Last Update: Dec 3, 2024
Questions: 878
EC0-350 pdf

EC0-350 PDF

$29.75  $84.99
EC0-350 Engine

EC0-350 Testing Engine

$33.25  $94.99
EC0-350 PDF + Engine

EC0-350 PDF + Testing Engine

$47.25  $134.99