EC-Council EC0-350 Exam Questions
Ethical Hacking and Countermeasures (Page 7 )

Updated On: 16-Feb-2026

Which is the Novell Netware Packet signature level used to sign all packets ?

  1. 0
  2. 1
  3. 2
  4. 3

Answer(s): D

Explanation:

Level 0 is no signature, Level 3 is communication using signature only.



An attacker runs netcat tool to transfer a secret file between two hosts.
Machine A: netcat -1 –p 1234 < secretfile
Machine B: netcat 192.168.3.4 > 1234
He is worried about information being sniffed on the network.
How would the attacker use netcat to encrypt information before transmitting it on the wire?

  1. Machine A: netcat -1 –p –s password 1234 < testfile
    Machine B: netcat <machine A IP> 1234
  2. Machine A: netcat -1 –e magickey –p 1234 < testfile
    Machine B: netcat <machine A IP> 1234
  3. Machine A: netcat -1 –p 1234 < testfile –pw password
    Machine B: netcat <machine A IP> 1234 –pw password
  4. Use cryptcat instead of netcat.

Answer(s): D

Explanation:

Cryptcat is the standard netcat enhanced with twofish encryption with ports for WIndows NT, BSD and Linux. Twofish is courtesy of counterpane, and cryptix. A default netcat installation does not contain any cryptography support.



What are the main drawbacks for anti-virus software?

  1. AV software is difficult to keep up to the current revisions.
  2. AV software can detect viruses but can take no action.
  3. AV software is signature driven so new exploits are not detected.
  4. It’s relatively easy for an attacker to change the anatomy of an attack to bypass AV systems
  5. AV software isn’t available on all major operating systems platforms.
  6. AV software is very machine (hardware) dependent.

Answer(s): C

Explanation:

Although there are functions like heuristic scanning and sandbox technology, the Antivirus program is still mainly depending of signature databases and can only find already known viruses.



WEP is used on 802.11 networks, what was it designed for?

  1. WEP is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what it usually expected of a wired LAN.
  2. WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a lever of integrity and privacy adequate for sensible but unclassified information.
  3. WEP is designed to provide a wireless local area network (WLAN) with a level of availability and privacy comparable to what is usually expected of a wired LAN.
  4. WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy comparable to what it usually expected of a wired LAN.

Answer(s): A

Explanation:

WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts — any WEP key can be cracked with readily available software in two minutes or less — and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004.



Which of the following keyloggers can’t be detected by anti-virus or anti-spyware products?

  1. Hardware keylogger
  2. Software Keylogger
  3. Stealth Keylogger
  4. Convert Keylogger

Answer(s): A

Explanation:

A hardware keylogger will never interact with the operating system and therefore it will never be detected by any security programs running in the operating system.






Post your Comments and Discuss EC-Council EC0-350 exam dumps with other Community members:

Join the EC0-350 Discussion