Exam Details

  • Exam Code
    :EC0-349
  • Exam Name
    :Computer Hacking Forensic Investigator
  • Certification
    :EC-COUNCIL Certifications
  • Vendor
    :EC-COUNCIL
  • Total Questions
    :304 Q&As
  • Last Updated
    :Mar 26, 2025

EC-COUNCIL EC-COUNCIL Certifications EC0-349 Questions & Answers

  • Question 251:

    After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

    A. RestrictAnonymous must be set to "10" for complete security

    B. RestrictAnonymous must be set to "3" for complete security

    C. RestrictAnonymous must be set to "2" for complete security

    D. There is no way to always prevent an anonymous null session from establishing

  • Question 252:

    In a virtual test environment, Michael is testing the strength and security of BGP using multiple routers to mimic the backbone of the Internet. This project will help him write his doctoral thesis on "bringing down the Internet". Without sniffing the traffic between the routers, Michael sends millions of RESET packets to the routers in an attempt to shut one or all of them down. After a few hours, one of the routers finally shuts itself down. What will the other routers communicate between themselves?

    A. The change in the routing fabric to bypass the affected router

    B. More RESET packets to the affected router to get it to power back up

    C. RESTART packets to the affected router to get it to power back up

    D. STOP packets to all other routers warning of where the attack originated

  • Question 253:

    How many possible sequence number combinations are there in TCP/IP protocol?

    A. 1 billion

    B. 320 billion

    C. 4 billion

    D. 32 million

  • Question 254:

    Tyler is setting up a wireless network for his business that he runs out of his home. He has followed all the directions from the ISP as well as the wireless router manual. He does not have any encryption set and the SSID is being broadcast. On his laptop, he can pick up the wireless signal for short periods of time, but then the connection drops and the signal goes away. Eventually the wireless signal shows back up, but drops intermittently. What could be Tyler issue with his home wireless network?

    A. Computers on his wired network

    B. Satellite television

    C. 2.4Ghz Cordless phones

    D. CB radio

  • Question 255:

    What does ICMP Type 3/Code 13 mean?

    A. Host Unreachable

    B. Administratively Blocked

    C. Port Unreachable

    D. Protocol Unreachable

  • Question 256:

    How many bits is Source Port Number in TCP Header packet?

    A. 16

    B. 32

    C. 48

    D. 64

  • Question 257:

    After passively scanning the network of Department of Defense (DoD), you switch over to active scanning to identify live hosts on their network. DoD is a large organization and should respond to any number of scans. You start an ICMP ping sweep by sending an IP packet to the broadcast address. Only five hosts respond to your ICMP pings; definitely not the number of hosts you were expecting. Why did this ping sweep only produce a few responses?

    A. Only IBM AS/400 will reply to this scan

    B. Only Windows systems will reply to this scan

    C. A switched network will not respond to packets sent to the broadcast address

    D. Only Unix and Unix-like systems will reply to this scan

  • Question 258:

    Julia is a senior security analyst for Berber Consulting group. She is currently working on a contract for a small accounting firm in Florid a. They have given her permission to perform social engineering attacks on the company to see if their in- house training did any good. Julia calls the main number for the accounting firm and talks to the receptionist. Julia says that she is an IT technician from the company's main office in Iowa. She states that she needs the receptionist's network username and password to troubleshoot a problem they are having. Julia says that Bill Hammond, the CEO of the company, requested this information. After hearing the name of the CEO, the receptionist gave Julia all the information she asked for. What principal of social engineering did Julia use?

    A. Social Validation

    B. Scarcity

    C. Friendship/Liking

    D. Reciprocation

  • Question 259:

    Harold wants to set up a firewall on his network but is not sure which one would be the most appropriate. He knows he needs to allow FTP traffic to one of the servers on his network, but he wants to only allow FTP-PUT. Which firewall would be most appropriate for Harold? needs?

    A. Circuit-level proxy firewall

    B. Packet filtering firewall

    C. Application-level proxy firewall

    D. Data link layer firewall

  • Question 260:

    What will the following command accomplish?

    A. Test ability of a router to handle over-sized packets

    B. Test the ability of a router to handle under-sized packets

    C. Test the ability of a WLAN to handle fragmented packets

    D. Test the ability of a router to handle fragmented packets

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EC-COUNCIL exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your EC0-349 exam preparations and EC-COUNCIL certification application, do not hesitate to visit our Vcedump.com to find your solutions here.