DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Prepare Strategically for the EC-Council EC0-350 Exam with Practice Tests

Take other online exams

Question #1
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
A. ast processor to help with network traffic analysis
B. hey must be dual-homed
C. imilar RAM requirements
D. ast network interface cards
View answer
Correct Answer: B
Question #2
Which of the following is an application that requires a host application for replication?
A. icro
B. orm
C. rojan
D. irus
View answer
Correct Answer: D
Question #3
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
A. aros Proxy
B. BProxy
C. BCrack
D. looover
View answer
Correct Answer: B
Question #4
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. estore a random file
B. erform a full restore
C. ead the first 512 bytes of the tape
D. ead the last 512 bytes of the tape
View answer
Correct Answer: B
Question #5
Which of the following describes the characteristics of a Boot Sector Virus?
A. oves the MBR to another location on the RAM and copies itself to the original location of the MBR
B. oves the MBR to another location on the hard disk and copies itself to the original location of the MBR
C. odifies directory table entries so that directory entries point to the virus code instead of the actual program
D. verwrites the original MBR and only executes the new virus code
View answer
Correct Answer: B
Question #6
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
A. etwork firewalls can prevent attacks because they can detect malicious HTTP traffic
B. etwork firewalls cannot prevent attacks because ports 80 and 443 must be opened
C. etwork firewalls can prevent attacks if they are properly configured
D. etwork firewalls cannot prevent attacks because they are too complex to configure
View answer
Correct Answer: B
Question #7
Which of the following programs is usually targeted at Microsoft Office products?
A. olymorphic virus
B. ultipart virus
C. acro virus
D. tealth virus
View answer
Correct Answer: C
Question #8
Bluetooth uses which digital modulation technique to exchange information between paired devices?
A. SK (phase-shift keying)
B. SK (frequency-shift keying)
C. SK (amplitude-shift keying)
D. AM (quadrature amplitude modulation)
View answer
Correct Answer: A
Question #9
In order to show improvement of security over time, what must be developed?
A. eports
B. esting tools
C. etrics
D. axonomy of vulnerabilities
View answer
Correct Answer: C
Question #10
Passive reconnaissance involves collecting information through which of the following?
A. ocial engineering
B. etwork traffic sniffing
C. an in the middle attacks
D. ublicly accessible sources
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: