Exam Details

  • Exam Code
    :EC0-349
  • Exam Name
    :Computer Hacking Forensic Investigator
  • Certification
    :Certified Ethical Hacker
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :304 Q&As
  • Last Updated
    :May 15, 2024

EC-COUNCIL Certified Ethical Hacker EC0-349 Questions & Answers

  • Question 11:

    You are assisting a Department of Defense contract company to become compliant with the stringent security policies set by the DoD. One such strict rule is that firewalls must only allow incoming connections that were first initiated by internal computers. What type of firewall must you implement to abide by this policy?

    A. Packet filtering firewall

    B. Circuit-level proxy firewall

    C. Application-level proxy firewall

    D. Stateful firewall

  • Question 12:

    Jessica works as systems administrator for a large electronics firm. She wants to scan her network quickly to detect live hosts by using ICMP ECHO Requests. What type of scan is Jessica going to perform?

    A. Tracert

    B. Smurf scan

    C. Ping trace

    D. ICMP ping sweep

  • Question 13:

    Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here?

    A. Send DOS commands to crash the DNS servers

    B. Perform DNS poisoning

    C. Perform a zone transfer

    D. Enumerate all the users in the domain

  • Question 14:

    What will the following command produce on a website login page? SELECT email, passwd, login_id, full_name FROM members WHERE email = '[email protected]'; DROP TABLE members; --'

    A. Deletes the entire members table

    B. Inserts the Error! Reference source not found.email address into the members table

    C. Retrieves the password for the first user in the members table

    D. This command will not produce anything since the syntax is incorrect

  • Question 15:

    You setup SNMP in multiple offices of your company. Your SNMP software manager is not receiving data from other offices like it is for your main office. You suspect that firewall changes are to blame. What ports should you open for SNMP to work through Firewalls? (Choose two.)

    A. 162

    B. 161

    C. 163

    D. 160

  • Question 16:

    Which of the following file system is used by Mac OS X?

    A. EFS

    B. HFS+

    C. EXT2

    D. NFS

  • Question 17:

    When you are running a vulnerability scan on a network and the IDS cuts off your connection, what type of IDS is being used?

    A. Passive IDS

    B. Active IDS

    C. Progressive IDS

    D. NIPS

  • Question 18:

    The rule of thumb when shutting down a system is to pull the power plug. However, it has certain drawbacks. Which of the following would that be?

    A. Any data not yet flushed to the system will be lost

    B. All running processes will be lost

    C. The /tmp directory will be flushed

    D. Power interruption will corrupt the pagefile

  • Question 19:

    You are a computer forensics investigator working with local police department and you are called to assist in an investigation of threatening emails. The complainant has printer out 27 email messages from the suspect and gives the printouts to you. You inform her that you will need to examine her computer because you need access to the _________________________ in order to track the emails back to the suspect.

    A. Routing Table

    B. Firewall log

    C. Configuration files

    D. Email Header

  • Question 20:

    Hackers can gain access to Windows Registry and manipulate user passwords, DNS settings, access rights or others features that they may need in order to accomplish their objectives. One simple method for loading an application at startup is to add an entry (Key) to the following Registry Hive:

    A. HKEY_LOCAL_MACHINE\hardware\windows\start

    B. HKEY_LOCAL_USERS\Software\Microsoft\old\Version\Load

    C. HKEY_CURRENT_USER\Microsoft\Default

    D. HKEY_LOCAL_MACHINE\Software\Microsoft\CurrentVersion\Run

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your EC0-349 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.