EC-Council EC0-350 Exam Questions
Ethical Hacking and Countermeasures (Page 24 )

Updated On: 17-Feb-2026

Which of the following buffer overflow exploits are related to Microsoft IIS web server? (Choose three)

  1. Internet Printing Protocol (IPP) buffer overflow
  2. Code Red Worm
  3. Indexing services ISAPI extension buffer overflow
  4. NeXT buffer overflow

Answer(s): A,B,C

Explanation:

Both the buffer overflow in the Internet Printing Protocol and the ISAPI extension buffer overflow is explained in Microsoft Security Bulletin MS01-023. The Code Red worm was a computer worm released on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server.



Jim is having no luck performing a penetration test in company’s network. He is running the tests from home and has downloaded every security scanner that he could lay his hands on. Despite knowing the IP range of all the systems, and the exact network configuration, Jim is unable to get any useful results.
Why is Jim having these problems?

  1. Security scanners are not designed to do testing through a firewall.
  2. Security scanners cannot perform vulnerability linkage.
  3. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.
  4. All of the above.

Answer(s): D

Explanation:

The Security scanners available online are often to “outdated” to perform a live pentest against a victim.



After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?

  1. Install pactehs
  2. Setup a backdoor
  3. Cover your tracks
  4. Install a zombie for DDOS

Answer(s): C

Explanation:

As a hacker you don’t want to leave any traces that could lead back to you.



Which one of the following network attacks takes advantages of weaknesses in the fragment reassembly functionality of the TCP/IP protocol stack?

  1. Teardrop
  2. Smurf
  3. Ping of Death
  4. SYN flood
  5. SNMP Attack

Answer(s): A

Explanation:

The teardrop attack uses overlapping packet fragments to confuse a target system and cause the system to reboot or crash.



Ethereal works best on ____________.

  1. Switched networks
  2. Linux platforms
  3. Networks using hubs
  4. Windows platforms
  5. LAN's

Answer(s): C

Explanation:

Ethereal is used for sniffing traffic. It will return the best results when used on an unswitched (i.e. hub. network.






Post your Comments and Discuss EC-Council EC0-350 exam dumps with other Community members:

Join the EC0-350 Discussion