Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Online EC0-350 Questions Video

Page: 8 / 32
Question 32

What is GINA?

Options:

A.

Gateway Interface Network Application

B.

GUI Installed Network Application CLASS

C.

Global Internet National Authority (G-USA)

D.

Graphical Identification and Authentication DLL

Question 33

Which tool/utility can help you extract the application layer data from each TCP connection from a log file into separate files?

Options:

A.

Snort

B.

argus

C.

TCPflow

D.

Tcpdump

Question 34

A denial of Service (DoS) attack works on the following principle:

Options:

A.

MS-DOS and PC-DOS operating system utilize a weaknesses that can be compromised and permit them to launch an attack easily.

B.

All CLIENT systems have TCP/IP stack implementation weakness that can be compromised and permit them to lunch an attack easily.

C.

Overloaded buffer systems can easily address error conditions and respond appropriately.

D.

Host systems cannot respond to real traffic, if they have an overwhelming number of incomplete connections (SYN/RCVD State).

E.

A server stops accepting connections from certain networks one those network become flooded.

Question 35

Which of the following is a protocol that is prone to a man-in-the-middle (MITM) attack and maps a 32-bit address to a 48-bit address?

Options:

A.

ICPM

B.

ARP

C.

RARP

D.

ICMP

Page: 8 / 32
Exam Code: EC0-350
Exam Name: Ethical Hacking and Countermeasures V8
Last Update: Nov 21, 2024
Questions: 878
EC0-350 pdf

EC0-350 PDF

$28  $80
EC0-350 Engine

EC0-350 Testing Engine

$33.25  $95
EC0-350 PDF + Engine

EC0-350 PDF + Testing Engine

$45.5  $130