Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Newly Released ECCouncil EC0-350 Exam PDF

Page: 3 / 32
Question 12

Which of the following are valid types of rootkits? (Choose three.)

Options:

A.

Hypervisor level

B.

Network level

C.

Kernel level

D.

Application level

E.

Physical level

F.

Data access level

Question 13

You want to perform advanced SQL Injection attack against a vulnerable website. You are unable to perform command shell hacks on this server. What must be enabled in SQL Server to launch these attacks?

Options:

A.

System services

B.

EXEC master access

C.

xp_cmdshell

D.

RDC

Question 14

Which tool would be used to collect wireless packet data?

Options:

A.

NetStumbler

B.

John the Ripper

C.

Nessus

D.

Netcat

Question 15

Perimeter testing means determining exactly what your firewall blocks and what it allows. To conduct a good test, you can spoof source IP addresses and source ports. Which of the following command results in packets that will appear to originate from the system at 10.8.8.8? Such a packet is useful for determining whether the firewall is allowing random packets in or out of your network.

Options:

A.

hping3 -T 10.8.8.8 -S netbios -c 2 -p 80

B.

hping3 -Y 10.8.8.8 -S windows -c 2 -p 80

C.

hping3 -O 10.8.8.8 -S server -c 2 -p 80

D.

hping3 -a 10.8.8.8 -S springfield -c 2 -p 80

Page: 3 / 32
Exam Code: EC0-350
Exam Name: Ethical Hacking and Countermeasures V8
Last Update: Dec 3, 2024
Questions: 878
EC0-350 pdf

EC0-350 PDF

$29.75  $84.99
EC0-350 Engine

EC0-350 Testing Engine

$33.25  $94.99
EC0-350 PDF + Engine

EC0-350 PDF + Testing Engine

$47.25  $134.99