Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Last Attempt EC0-350 Questions

Page: 21 / 46
Total 878 questions

Ethical Hacking and Countermeasures V8 Questions and Answers

Question 81

Bob reads an article about how insecure wireless networks can be. He gets approval from his management to implement a policy of not allowing any wireless devices on the network. What other steps does Bob have to take in order to successfully implement this? (Select 2 answer.)

Options:

A.

Train users in the new policy.

B.

Disable all wireless protocols at the firewall.

C.

Disable SNMP on the network so that wireless devices cannot be configured.

D.

Continuously survey the area for wireless devices.

Question 82

You find the following entries in your web log. Each shows attempted access to either root.exe or cmd.exe.

What caused this?

Options:

A.

The Morris worm

B.

The PIF virus

C.

Trinoo

D.

Nimda

E.

Code Red

F.

Ping of Death

Question 83

What does black box testing mean?

Options:

A.

You have full knowledge of the environment

B.

You have no knowledge of the environment

C.

You have partial knowledge of the environment

Question 84

What is the best means of prevention against viruses?

Options:

A.

Assign read only permission to all files on your system.

B.

Remove any external devices such as floppy and USB connectors.

C.

Install a rootkit detection tool.

D.

Install and update anti-virus scanner.

Page: 21 / 46
Total 878 questions