EC-Council EC0-350 Exam Questions
Ethical Hacking and Countermeasures (Page 28 )

Updated On: 17-Feb-2026

Usernames, passwords, e-mail addresses, and the location of CGI scripts may be obtained from which of the following information sources?

  1. Company web site
  2. Search engines
  3. EDGAR Database query
  4. Whois query

Answer(s): A

Explanation:

Whois query would not enable us to find the CGI scripts whereas in the actual website, some of them will have scripts written to make the website more user friendly. The EDGAR database would in fact give us a lot of the information requested but not the location of CGI scripts, as would a simple search engine on the Internet if you have the time needed.



On a default installation of Microsoft IIS web server, under which privilege does the web server software execute?

  1. Everyone
  2. Guest
  3. System
  4. Administrator

Answer(s): C

Explanation:

If not changed during the installation, IIS will execute as Local System with way to high privileges.



You have just received an assignment for an assessment at a company site. Company's management is concerned about external threat and wants to take appropriate steps to insure security is in place. Anyway the management is also worried about possible threats coming from inside the site, specifically from employees belonging to different Departments. What kind of assessment will you be performing ?

  1. Black box testing
  2. Black hat testing
  3. Gray box testing
  4. Gray hat testing
  5. White box testing
  6. White hat testing

Answer(s): C

Explanation:

Internal Testing is also referred to as Gray-box testing.



Which of the following statements would not be a proper definition for a Trojan Horse?

  1. An unauthorized program contained within a legitimate program.
    This unauthorized program performs functions unknown (and probably unwanted) by the user.
  2. A legitimate program that has been altered by the placement of unauthorized code within it; this code perform functions unknown (and probably unwanted) by the user.
  3. An authorized program that has been designed to capture keyboard keystrokes while the user remains unaware of such an activity being performed.
  4. Any program that appears to perform a desirable and necessary function but that (because of unauthorized code within it that is unknown to the user) performs functions unknown (and definitely unwanted) by the user.

Answer(s): C

Explanation:

A Trojan is all about running unauthorized code on the users computer without the user knowing of it.



A denial of Service (DoS) attack works on the following principle:

  1. MS-DOS and PC-DOS operating system utilize a weaknesses that can be compromised and permit them to launch an attack easily.
  2. All CLIENT systems have TCP/IP stack implementation weakness that can be compromised and permit them to lunch an attack easily.
  3. Overloaded buffer systems can easily address error conditions and respond appropriately.
  4. Host systems cannot respond to real traffic, if they have an overwhelming number of incomplete connections (SYN/RCVD State).
  5. A server stops accepting connections from certain networks one those network become flooded.

Answer(s): D

Explanation:

Denial-of-service (often abbreviated as DoS) is a class of attacks in which an attacker attempts to prevent legitimate users from accessing an Internet service, such as a web site. This can be done by exercising a software bug that causes the software running the service to fail (such as the “Ping of Death” attack against Windows NT systems), sending enough data to consume all available network bandwidth (as in the May, 2001 attacks against Gibson Research), or sending data in such a way as to consume a particular resource needed by the service.






Post your Comments and Discuss EC-Council EC0-350 exam dumps with other Community members:

Join the EC0-350 Discussion