For interactive and self-paced preparation of exam EC0-350, try our practice exams.
Practice exams also include self assessment and reporting features
1
CEH Exam-EC0-350
Ethical Hacking and Countermeasures
http://www.certsking.com/EC0-350.html
2009
www.certsking.com
Total Questions: 10
For interactive and self-paced preparation of exam EC0-350, try our practice exams.
Practice exams also include self assessment and reporting features
2
Question: 1
An attacker runs netcat tool to transfer a secret file between two hosts. Machine A: netcat -l -p 1234 < secretfile Machine
B: netcat 192.168.3.4 > 1234 He is worried about information being sniffed on the network. How would the attacker use
netcat to encrypt the information before transmitting onto the wire?
A. Machine A: netcat -l -p -s password 1234 < testfile Machine B: netcat <machine A IP> 1234
B. Machine A: netcat -l -e magickey -p 1234 < testfile Machine B: netcat <machine A IP> 1234
C. Machine A: netcat -l -p 1234 < testfile -pw password Machine B: netcat <machine A IP> 1234 -pw password
D. Use cryptcat instead of netcat
Answer: D
Question: 2
Which of the following best describes Vulnerability?
A. The loss potential of a threat
B. An action or event that might prejudice security
C. An agent that could take advantage of a weakness
D. A weakness or error that can lead to a compromise
Answer: D
Question: 3
John is the network administrator of XSECURITY systems. His network was recently compromised. He analyzes the
logfiles to investigate the attack. Take a look at the following Linux logfile snippet. The hacker compromised and "owned"
a Linux machine. What is the hacker trying to accomplish here?
[root@apollo /]# rm rootkit.c [root@apollo /]# [root@apollo /]# ps -aux | grep inetd ; ps -aux | grep portmap ; rm
/sbin/portmap ; rm /tmp/h ; rm /usr/sbin/rpc.portmap ; rm -rf .bash* ; rm - rf /root/.bash_history ; rm - rf /usr/sbin/namedps
-aux | g