New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

ECCouncil EC0-350 Questions Answers

Page: 28 / 32
Question 112

Exhibit

Study the log given in the exhibit,

Precautionary measures to prevent this attack would include writing firewall rules. Of these firewall rules, which among the following would be appropriate?

Options:

A.

Disallow UDP 53 in from outside to DNS server

B.

Allow UDP 53 in from DNS server to outside

C.

Disallow TCP 53 in form secondaries or ISP server to DNS server

D.

Block all UDP traffic

Question 113

A program that defends against a port scanner will attempt to:

Options:

A.

Sends back bogus data to the port scanner

B.

Log a violation and recommend use of security-auditing tools

C.

Limit access by the scanning system to publicly available ports only

D.

Update a firewall rule in real time to prevent the port scan from being completed

Question 114

What is the expected result of the following exploit?

Options:

A.

Opens up a telnet listener that requires no username or password.

B.

Create a FTP server with write permissions enabled.

C.

Creates a share called “sasfile” on the target system.

D.

Creates an account with a user name of Anonymous and a password of noone@nowhere.com.

Question 115

In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless communications. Immediately after the implementation, users begin complaining about how slow the wireless network is. After benchmarking the network’s speed. Bob discovers that throughput has dropped by almost half even though the number of users has remained the same.

Why does this happen in the VPN over wireless implementation?

Options:

A.

The stronger encryption used by the VPN slows down the network.

B.

Using a VPN with wireless doubles the overhead on an access point for all direct client to access point communications.

C.

VPNs use larger packets then wireless networks normally do.

D.

Using a VPN on wireless automatically enables WEP, which causes additional overhead.

Page: 28 / 32
Exam Code: EC0-350
Exam Name: Ethical Hacking and Countermeasures V8
Last Update: Dec 22, 2024
Questions: 878
EC0-350 pdf

EC0-350 PDF

$25.5  $84.99
EC0-350 Engine

EC0-350 Testing Engine

$28.5  $94.99
EC0-350 PDF + Engine

EC0-350 PDF + Testing Engine

$40.5  $134.99