EC-Council EC0-350 Exam Questions
Ethical Hacking and Countermeasures (Page 22 )

Updated On: 17-Feb-2026

Jim’s organization has just completed a major Linux roll out and now all of the organization’s systems are running the Linux 2.5 kernel. The roll out expenses has posed constraints on purchasing other essential security equipment and software. The organization requires an option to control network traffic and also perform stateful inspection of traffic going into and out of the DMZ.
Which built-in functionality of Linux can achieve this?

  1. IP Tables
  2. IP Chains
  3. IP Sniffer
  4. IP ICMP

Answer(s): A

Explanation:

iptables is a user space application program that allows a system administrator to configure the netfilter tables, chains, and rules (described above). Because iptables requires elevated privileges to operate, it must be executed by user root, otherwise it fails to function. On most Linux systems, iptables is installed as /sbin/iptables. IP Tables performs stateful inspection while the older IP Chains only performs stateless inspection.



Your boss is attempting to modify the parameters of a Web-based application in order to alter the SQL statements that are parsed to retrieve data from the database. What would you call such an attack?

  1. SQL Input attack
  2. SQL Piggybacking attack
  3. SQL Select attack
  4. SQL Injection attack

Answer(s): D

Explanation:

This technique is known as SQL injection attack



Exhibit:

You are conducting pen-test against a company’s website using SQL Injection techniques. You enter “anuthing or 1=1-“ in the username filed of an authentication form. This is the output returned from the server.
What is the next step you should do?

  1. Identify the user context of the web application by running_
    http://www.example.com/order/include_rsa_asp?pressReleaseID=5
    AND
    USER_NAME() = ‘dbo’
  2. Identify the database and table name by running:
    http://www.example.com/order/include_rsa.asp?pressReleaseID=5
    AND
    ascii(lower(substring((SELECT TOP 1 name FROM sysobjects WHERE
    xtype=’U’), 1))) > 109
  3. Format the C: drive and delete the database by running:
    http://www.example.com/order/include_rsa.asp?pressReleaseID=5 AND
    xp_cmdshell ‘format c: /q /yes ‘; drop database myDB; --
  4. Reboot the web server by running:
    http://www.example.com/order/include_rsa.asp?pressReleaseID=5
    AND xp_cmdshell ‘iisreset –reboot’; --

Answer(s): A



Bob is acknowledged as a hacker of repute and is popular among visitors of “underground” sites. Bob is willing to share his knowledge with those who are willing to learn, and many have expressed their interest in learning from him. However, this knowledge has a risk associated with it, as it can be used for malevolent attacks as well.
In this context, what would be the most affective method to bridge the knowledge gap between the “black” hats or crackers and the “white” hats or computer security professionals? (Choose the test answer)

  1. Educate everyone with books, articles and training on risk analysis, vulnerabilities and safeguards.
  2. Hire more computer security monitoring personnel to monitor computer systems and networks.
  3. Make obtaining either a computer security certification or accreditation easier to achieve so more individuals feel that they are a part of something larger than life.
  4. Train more National Guard and reservist in the art of computer security to help out in times of emergency or crises.

Answer(s): A

Explanation:

Bridging the gap would consist of educating the white hats and the black hats equally so that their knowledge is relatively the same. Using books, articles, the internet, and professional training seminars is a way of completing this goal.



A user on your Windows 2000 network has discovered that he can use L0phtcrack to sniff the SMB exchanges which carry user logons. The user is plugged into a hub with 23 other systems. However, he is unable to capture any logons though he knows that other users are logging in.
What do you think is the most likely reason behind this?

  1. There is a NIDS present on that segment.
  2. Kerberos is preventing it.
  3. Windows logons cannot be sniffed.
  4. L0phtcrack only sniffs logons to web servers.

Answer(s): B

Explanation:

In a Windows 2000 network using Kerberos you normally use pre-authentication and the user password never leaves the local machine so it is never exposed to the network so it should not be able to be sniffed.






Post your Comments and Discuss EC-Council EC0-350 exam dumps with other Community members:

Join the EC0-350 Discussion