Exam Details

  • Exam Code
    :EC0-349
  • Exam Name
    :Computer Hacking Forensic Investigator
  • Certification
    :Certified Ethical Hacker
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :304 Q&As
  • Last Updated
    :May 15, 2024

EC-COUNCIL Certified Ethical Hacker EC0-349 Questions & Answers

  • Question 291:

    What operating system would respond to the following command?

    A. Windows 95

    B. FreeBSD

    C. Windows XP

    D. Mac OS X

  • Question 292:

    Paul's company is in the process of undergoing a complete security audit including logical and physical security testing. After all logical tests were performed; it is now time for the physical round to begin. None of the employees are made aware of this round of testing. The security-auditing firm sends in a technician dressed as an electrician. He waits outside in the lobby for some employees to get to work and follows behind them when they access the restricted areas. After entering the main office, he is able to get into the server room telling the IT manager that there is a problem with the outlets in that room. What type of attack has the technician performed?

    A. Tailgating

    B. Backtrapping

    C. Man trap attack

    D. Fuzzing

  • Question 293:

    Your company uses Cisco routers exclusively throughout the network. After securing the routers to the best of your knowledge, an outside security firm is brought in to assess the network security. Although they found very few issues, they were able to enumerate the model, OS version, and capabilities for all your Cisco routers with very little effort. Which feature will you disable to eliminate the ability to enumerate this information on your Cisco routers?

    A. Border Gateway Protocol

    B. Cisco Discovery Protocol

    C. Broadcast System Protocol

    D. Simple Network Management Protocol

  • Question 294:

    George is the network administrator of a large Internet company on the west coast. Per corporate policy,

    none of the employees in the company are allowed to use FTP or SFTP programs without obtaining

    approval from the IT department. Few managers are using SFTP program on their computers. Before

    talking to his boss, George wants to have some proof of their activity. George wants to use Ethereal to

    monitor network traffic, but only SFTP traffic to and from his network.

    What filter should George use in Ethereal?

    A. src port 23 and dst port 23

    B. udp port 22 and host 172.16.28.1/24

    C. net port 22

    D. src port 22 and dst port 22

  • Question 295:

    George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as "stealthy" as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?

    A. Nessus is too loud

    B. Nessus cannot perform wireless testing

    C. Nessus is not a network scanner

    D. There are no ways of performing a "stealthy" wireless scan

  • Question 296:

    At what layer of the OSI model do routers function on?

    A. 4

    B. 3

    C. 1

    D. 5

  • Question 297:

    Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but Questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?

    A. APIPA

    B. IANA

    C. CVE

    D. RIPE

  • Question 298:

    George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used.

    What IDS feature must George implement to meet this requirement?

    A. Signature-based anomaly detection

    B. Pattern matching

    C. Real-time anomaly detection

    D. Statistical-based anomaly detection

  • Question 299:

    John is using Firewalk to test the security of his Cisco PIX firewall. He is also utilizing a sniffer located on a subnet that resides deep inside his network. After analyzing the sniffer log files, he does not see any of the traffic produced by Firewalk. Why is that?

    A. Firewalk cannot pass through Cisco firewalls

    B. Firewalk sets all packets with a TTL of zero

    C. Firewalk cannot be detected by network sniffers

    D. Firewalk sets all packets with a TTL of one

  • Question 300:

    After undergoing an external IT audit, George realizes his network is vulnerable to DDoS attacks. What countermeasures could he take to prevent DDoS attacks?

    A. Enable direct broadcasts

    B. Disable direct broadcasts

    C. Disable BGP

    D. Enable BGP

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your EC0-349 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.