Ethical Hacking and Countermeasures
Exam Questions, Answers,
The EC0-350 is down. Completed
my EC0-350 course. It was bcuz of www.exams.ws . All
the questions in the exam are from their study guide.
I got help from this site in my exam.
Goodluck to u too. I have managed some questions.
What is the essential difference between an 'Ethical
Hacker' and a 'Cracker'?
A. The ethical hacker does not use the same techniques
or skills as a cracker.
B. The ethical hacker does it strictly for financial
motives unlike a cracker.
C. The ethical hacker has authorization from the owner
of the target.
D. The ethical hacker is just a cracker who is getting
What does the term "Ethical Hacking" mean?
A. Someone who is hacking for ethical reasons.
B. Someone who is using his/her skills for ethical
C. Someone who is using his/her skills for defensive
D. Someone who is using his/her skills for offensive
Who is an Ethical Hacker?
A. A person whohacksfor ethical reasons
B. A person whohacksfor an ethical cause
C. A person whohacksfor defensive purposes
D. A person whohacksfor offensive purposes
He is a security professional who applies his hacking
skills for defensive purposes.
What is "Hacktivism"?
A. Hacking for a cause
B. Hacking ruthlessly
C. An association which groups activists
D. None of the above
Where should a security tester be looking for information
that could be used by an attacker against an organization?
(Select all that apply)
A. CHAT rooms
B. WHOIS database
C. News groups
D. Web sites
E. Search engines
F. Organization's own web site
Answer: A, B, C, D, E, F
What are the two basic types of attacks?(Choose two.
Answer: B, D
Passive and active attacks are the two basic types
You are footprinting Acme.com to gather competitive
intelligence. You visit the acme.com websire for contact
information and telephone number numbers but do not
find it listed there. You know that they had the entire
staff directory listed on their website 12 months
ago but now it is not there. How would it be possible
for you to retrieve information from the website that
A. Visit google search engine and view the cached
B. Visit Archive.org site to retrieve the Internet
archive of the acme website.
C. Crawl the entire website and store them into your
D. Visit the company's partners and customers website
for this information.
User which Federal Statutes does FBI investigate for
computer crimes involving e-mail scams and mail fraud?
A. 18 U.S.C 1029 Possession of Access Devices
B. 18 U.S.C 1030 Fraud and related activity in connection
C. 18 U.S.C 1343 Fraud by wire, radio or television
D. 18 U.S.C 1361 Injury to Government Property
E. 18 U.S.C 1362 Government communication systems.
F. 18 U.S.C 1831 Economic Espionage Act
G. 18 U.S.C 1832 Trade Secrets Act
Which of the following activities will NOT be considered
as passive footprinting?
A. Go through the rubbish to find out any information
that might have been discarded.
B. Search on financial site such as Yahoo Financial
to identify assets.
C. Scan the range of IP address found in the target
D. Perform multiples queries using a search engine.