EC-Council EC0-350 Exam Questions
Ethical Hacking and Countermeasures (Page 12 )

Updated On: 17-Feb-2026

What is the best means of prevention against viruses?

  1. Assign read only permission to all files on your system.
  2. Remove any external devices such as floppy and USB connectors.
  3. Install a rootkit detection tool.
  4. Install and update anti-virus scanner.

Answer(s): D

Explanation:

Although virus scanners only can find already known viruses this is still the best defense, together with users that are informed about risks with the internet.



RC4 is known to be a good stream generator. RC4 is used within the WEP standard on wireless LAN. WEP is known to be insecure even if we are using a stream cipher that is known to be secured.
What is the most likely cause behind this?

  1. There are some flaws in the implementation.
  2. There is no key management.
  3. The IV range is too small.
  4. All of the above.
  5. None of the above.

Answer(s): D

Explanation:

Because RC4 is a stream cipher, the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there is a 50% probability the same IV will repeat after 5000 packets.
Many WEP systems require a key in hexadecimal format. Some users choose keys that spell words in the limited 0-9, A-F hex character set, for example C0DE C0DE C0DE C0DE. Such keys are often easily guessed.



Once an intruder has gained access to a remote system with a valid username and password, the attacker will attempt to increase his privileges by escalating the used account to one that has increased privileges. such as that of an administrator. What would be the best countermeasure to protect against escalation of priveges?

  1. Give users tokens
  2. Give user the least amount of privileges
  3. Give users two passwords
  4. Give users a strong policy document

Answer(s): B

Explanation:

With less privileges it is harder to increase the privileges.



What does the this symbol mean?

  1. Open Access Point
  2. WPA Encrypted Access Point
  3. WEP Encrypted Access Point
  4. Closed Access Point

Answer(s): A

Explanation:

This symbol is a “warchalking” symbol for a open node (open circle) with the SSID tsunami and the bandwidth 2.0 Mb/s



What is the expected result of the following exploit?

  1. Opens up a telnet listener that requires no username or password.
  2. Create a FTP server with write permissions enabled.
  3. Creates a share called “sasfile” on the target system.
  4. Creates an account with a user name of Anonymous and a password of noone@nowhere.com.

Answer(s): A

Explanation:

The script being depicted is in perl (both msadc.pl and the script their using as a wrapper) -- $port, $your, $user, $pass, $host are variables that hold the port # of a DNS server, an IP, username, and FTP password. $host is set to argument variable 0 (which means the string typed directly after the command). Essentially what happens is it connects to an FTP server and downloads nc.exe (the TCP/IP swiss-army knife -- netcat) and uses nc to open a TCP port spawning cmd.exe (cmd.exe is the Win32 DOS shell on NT/2000/2003/XP), cmd.exe when spawned requires NO username or password and has the permissions of the username it is being executed as (probably guest in this instance, although it could be administrator). The #'s in the script means the text following is a comment, notice the last line in particular, if the # was removed the script would spawn a connection to itself, the host system it was running on.






Post your Comments and Discuss EC-Council EC0-350 exam dumps with other Community members:

Join the EC0-350 Discussion