Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

ECCouncil Updated EC0-350 Exam Questions and Answers by rome

Page: 25 / 32

ECCouncil EC0-350 Exam Overview :

Exam Name: Ethical Hacking and Countermeasures V8
Exam Code: EC0-350 Dumps
Vendor: ECCouncil Certification: Certified Ethical Hacker
Questions: 878 Q&A's Shared By: rome
Question 100

What is a sniffing performed on a switched network called?

Options:

A.

Spoofed sniffing

B.

Passive sniffing

C.

Direct sniffing

D.

Active sniffing

Discussion
Question 101

What type of attack is shown in the following diagram?

Questions 101

Options:

A.

Man-in-the-Middle (MiTM) Attack

B.

Session Hijacking Attack

C.

SSL Spoofing Attack

D.

Identity Stealing Attack

Discussion
Lennox
Something Special that they provide a comprehensive overview of the exam content. They cover all the important topics and concepts, so you can be confident that you are well-prepared for the test.
Aiza (not set)
That makes sense. What makes Cramkey Dumps different from other study materials?
Yusra
I passed my exam. Cramkey Dumps provides detailed explanations for each question and answer, so you can understand the concepts better.
Alisha (not set)
I recently used their dumps for the certification exam I took and I have to say, I was really impressed.
Amy
I passed my exam and found your dumps 100% relevant to the actual exam.
Lacey (not set)
Yeah, definitely. I experienced the same.
Anaya
I found so many of the same questions on the real exam that I had already seen in the Cramkey Dumps. Thank you so much for making exam so easy for me. I passed it successfully!!!
Nina (not set)
It's true! I felt so much more confident going into the exam because I had already seen and understood the questions.
Question 102

A common technique for luring e-mail users into opening virus-launching attachments is to send messages that would appear to be relevant or important to many of their potential recipients. One way of accomplishing this feat is to make the virus-carrying messages appear to come from some type of business entity retailing sites, UPS, FEDEX, CITIBANK or a major provider of a common service.

Here is a fraudulent e-mail claiming to be from FedEx regarding a package that could not be delivered. This mail asks the receiver to open an attachment in order to obtain the FEDEX tracking number for picking up the package. The attachment contained in this type of e-mail activates a virus.

Questions 102

Vendors send e-mails like this to their customers advising them not to open any files attached with the mail, as they do not include attachments.

Fraudulent e-mail and legit e-mail that arrives in your inbox contain the fedex.com as the sender of the mail.

How do you ensure if the e-mail is authentic and sent from fedex.com?

Options:

A.

Verify the digital signature attached with the mail, the fake mail will not have Digital ID at all

B.

Check the Sender ID against the National Spam Database (NSD)

C.

Fake mail will have spelling/grammatical errors

D.

Fake mail uses extensive images, animation and flash content

Discussion
Question 103

Why would an ethical hacker use the technique of firewalking?

Options:

A.

It is a technique used to discover wireless network on foot.

B.

It is a technique used to map routers on a network link.

C.

It is a technique used to discover the nature of rules configured on a gateway.

D.

It is a technique used to discover interfaces in promiscuous mode.

Discussion
Page: 25 / 32
Title
Questions
Posted

EC0-350
PDF

$35  $99.99

EC0-350 Testing Engine

$42  $119.99

EC0-350 PDF + Testing Engine

$56  $159.99